• Featured more »

  • 74% of APJ organisations face significant risk of cyber incidents

    74% of APJ organisations face significant risk of cyber incidents

    Overreliance on perimeter-based defence creates more opportunities for attackers using advanced threats RSA, The Security Division of EMC, has announced the results of research that demonstrates organisations in Asia Pacific and Japan (APJ) investing in detection and response technologies are better poised to defend against today’s advanced threats, in comparison to those primarily utilising perimeter-based […]

  • SITREP – The kidnap prevention mindset

    SITREP – The kidnap prevention mindset

    The recent increase in kidnappings of foreigners working in unstable environments suggests that a paradigm shift may be required for how companies, media organisations and the humanitarian sector operates. One that requires an unconventional, adaptable mindset. This begins with an appreciation of the context of the local and regional human terrain an understanding how to […]

  • Asia Pacific Security more »

  • 74% of APJ organisations face significant risk of cyber incidents

    74% of APJ organisations face significant risk of cyber incidents

    Overreliance on perimeter-based defence creates more opportunities for attackers using advanced threats RSA, The Security Division of EMC, has announced the results of research that demonstrates organisations in Asia Pacific and Japan (APJ) investing in detection and response technologies are better poised to defend against today’s advanced threats, in comparison to those primarily utilising perimeter-based […]

  • Fake lockscreen app on Google Play: Pokemon GO Ultimate

    Fake lockscreen app on Google Play: Pokemon GO Ultimate

    ESET researchers have discovered fake apps on Google Play targeting Pokémon GO’s hungry hordes. Among them is the first ever fake lockscreen app on Google Play and two scareware apps. All of the fake apps discovered by ESET and detected by ESET Mobile Security – lockscreen app named Pokemon GO Ultimate and scareware apps “Guide […]

  • Tech Time more »

  • ISACA Challenges Mobile Payment Security Perceptions

    ISACA Challenges Mobile Payment Security Perceptions

    New guide shows mobile security advantages over traditional payment methods Advancements in mobile payment security technology are curbing risks and improving consumer trust beyond levels traditionally associated with plastic payment cards, according to new research from global IT association ISACA. A complimentary guide released on the 21st of July, “Is Mobile the Winner in Payment […]

  • Innovation drives hologram ID document protection

    Innovation drives hologram ID document protection

    Incidences of fake driver’s licenses in the US and reports by China’s state run Xinhua news agency that 40% of items sold online in China are either counterfeit or of bad quality, reiterate that the battle to beat the criminals, particular those involved in ID counterfeiting, remains to be won. However, governments, security agencies and […]

  • Frontline Security more »

  • SITREP – The kidnap prevention mindset

    SITREP – The kidnap prevention mindset

    The recent increase in kidnappings of foreigners working in unstable environments suggests that a paradigm shift may be required for how companies, media organisations and the humanitarian sector operates. One that requires an unconventional, adaptable mindset. This begins with an appreciation of the context of the local and regional human terrain an understanding how to […]

  • Innovation drives hologram ID document protection

    Innovation drives hologram ID document protection

    Incidences of fake driver’s licenses in the US and reports by China’s state run Xinhua news agency that 40% of items sold online in China are either counterfeit or of bad quality, reiterate that the battle to beat the criminals, particular those involved in ID counterfeiting, remains to be won. However, governments, security agencies and […]

  • Other Recent Articles

  • Converge Information Technology (IT) and Operational Technology (OT)

    Converge Information Technology (IT) and Operational Technology (OT)

    ISACA and the International Society of Automation Issue Call to Action The convergence of information technology and operational technology is a business imperative to improve information security, according to new guidance from global IT association ISACA and the International Society of Automation (ISA). The guide, “The Merging of Cyber Security and Operational Technology,” resulted from […]