Asia's Source for Enterprise Network Knowledge

Monday, May 27th, 2019

Data encryption and security

Evolving cybersecurity threats and how enterprises can stay ahead

Digitally transforming enterprises are now able to seamlessly integrate a myriad of service providers and business partners globally through diverse private interconnections. Equinix’s Global Interconnection Index volume 2 (GXI2) pointed out that bandwidth to support enterprises’ interconnections to cloud and IT providers in Asia Pacific, for instance, will have grown at a

Most businesses aren't ready for Generation 6 Cyberthreats

As we begin to deploy IoT soluiotns, the Check Point CEO feels that the seucity it needs is sorely lacking. 

Security-performance balance in combating encrypted threats

A key discovery from F5 Labs’ study of a decade's worth of breach cases is that companies usually only know a small fraction of what went on in the attacks that lead to a breach.

Misconfigured FTP, SMB, Rsync, and S3 buckets exposing 1.5 billion files

Digital Shadows assessed the sensitive data exposed from some of the most ubiquitous file sharing services across the Internet, and found over twelve petabytes of publicly available data across open Amazon S3 buckets, rsync, SMB, FTP servers, misconfigured websites, and NAS drives. This document details the problems of having so much unsecured data, and the solutions that are needed to manage them.
By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Ex-Talk Talk CEO shares lessons from massive 2015 data breach

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Dido Harding says boards should communicate risks with security teams - an important lesson from Talk Talk's 2015 cyber breach that led to a record £400,000 fine


Avoiding security event information overload

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Choose a security event information management (SEIM) vendor that helps you focus on only the security event data that needs to be investigated.


Are you crypto-agile?

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

A recent spate of successful attacks against our most popular and trusted cryptographic algorithms has me hoping that all companies understand the importance of crypto-agility.


Transpacific in-transit encryption trial achieves 100Gbps

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

The data travelled from Los Angeles to Japan via the Unity cable system, from Japan to Guam via AJC (Australia-Japan Cable), then to Paddington in Sydney and on to Melbourne.

Do You Have the Data Agility Your Business Needs?

The challenge to get insights from data has put immense pressure on CIOs to not only manage ever-growing data volumes, sources, and types, but to also support more and more data users as well as new and increasingly complex use cases.


Not all heroes wear capes in today’s digital economy

Every organization has their own everyday digital superheroes working quietly in the background – protecting and managing data, and bringing order to chaos in the quickest possible way. But how do they do it?