Asia's Source for Enterprise Network Knowledge

Wednesday, May 22nd, 2019

Identity and Access Management

How to lose money to (credential) stocking stuffers

CA strengthens identity-centric security portfolio

Credential Stuffing is an emerging type of attack that uses automated scripts to try out username/password pairs to gain access to a system and is becoming a popular form of attack against enterprises says expert.

Nine essential elements for a strong privileged account management strategy

Internet of trusted things

We talk to a security expert on why every IT manager or security administrator should implement to protect privileged accounts.

Most businesses aren't ready for Generation 6 Cyberthreats

As we begin to deploy IoT soluiotns, the Check Point CEO feels that the seucity it needs is sorely lacking. 

Reinforcing the Security Chain

Enterprise security education must be paired with context-aware, automated security solutions in order to reinforce the weak links in the enterprise's security chain

Are you the biggest threat to your employer

The trusted insider has always been a security risk - whether an executive with access to sensitive information or an administrator on an enterprise network.

IT leaders plan to ‘consumerize’ employee access to cloud services

IT managers are struggling to balance the need for a simple and easy login experience with security.

Risking security for an easy life: people’s password dilemmas revealed

There needs to be a balance between Weak and Memorable vs ‘So Secure I Forgot it’  says expert. 

Password managers grow up, target business users

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Enterprise-class password managers fill key security gaps left by single sign-on (SSO) and cloud access solutions.


What is a supply chain attack? Why you should be wary of third-party providers

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.


The success of digital identity hinges on the power of mobile

The sooner we can better anonymize user data and information, the sooner we can welcome a brand new generation of digital services in Singapore.