Asia's Source for Enterprise Network Knowledge

Sunday, May 26th, 2019

Data Encryption And Security

Digitally transforming enterprises are now able to seamlessly integrate a myriad of service...
Many businesses are generally only protected against Gen 2 or 3 security threats Gil Shwed, Check...
A key discovery from F5 Labs’ study of a decade's worth of breach cases is that...
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
Baroness Dido Harding, the former CEO of Talk Talk, opened Infosecurity Europe 2018 by warning...
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
I often run into computer security event monitoring teams that brag about how much information they...
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
Our world relies on secure digital cryptography. Secure doesn’t mean unbreakable forever. No...
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
Engineers from Telstra, Ericsson and Ciena have demonstrated the ability to encrypt data while in...
Data is the new battleground. For companies, the situation is clear – their future depends on...
Imagine a reality where darkness cloaks the world. Where backstreet alleys are the latest setting...
These days, with cyberattacks and data theft becoming ever more prevalent, it is more important...

WhitePapers

Companies have to do more than just store, extract, and analyze your data —...
Barracuda Backup is an affordable, integrated local and offsite data backup and...
Adoption of network-attached storage (NAS) devices has increased significantly...