• Featured more »

  • Are security vendors leaving your business at risk?

    Are security vendors leaving your business at risk?

    An issue that I’ve been mulling over for some time relates to the fundamental nature of customer security engagements, especially concerning product vendors and their place as trusted advisors. This issue led me to a couple of conclusions. Firstly, there is a mismatch between what’s best for the client and what’s best for the vendor. […]

  • Fighting technology with technology: protecting children from cyber bullies

    Fighting technology with technology: protecting children from cyber bullies

    Technology has altered the way we live. This goes for both positive interactions with technology, such as keeping in touch with family overseas, as well as the negative aspects, such as cyber bullying, cyber stalking and cyber terrorism. Cyber bullying is no different to traditional bullying, aside from it leveraging technology. Cyber bullies use of […]

  • Asia Pacific Security more »

  • INTERPOL World 2017 builds up momentum with strong support from  public and private sectors

    INTERPOL World 2017 builds up momentum with strong support from public and private sectors

    The second edition of INTERPOL World has garnered strong support from public and private sectors, both locally and on the international front. Owned by INTERPOL, the world’s largest police organization with 190 member countries, the event is supported by Singapore’s Ministry of Home Affairs (MHA), the World Economic Forum and CyberSecurity Malaysia, an agency under […]

  • The world’s leading critical communications congress and exhibition heads to Hong Kong

    The world’s leading critical communications congress and exhibition heads to Hong Kong

    Critical Communications World (May 16-18, Hong Kong) is the leading and most influential congress and exhibition dedicated to connecting critical communications professionals for three days of thought provoking discussion, debate and networking. Hosting this year’s 19th Annual event in Hong Kong provides the perfect setting, with this year’s theme focused on network optimization and transition. […]

  • Tech Time more »

  • Cylance designated one of 50 companies leading the AI revolution in Fortune Magazine

    Cylance designated one of 50 companies leading the AI revolution in Fortune Magazine

    The only endpoint security company named to Fortune’s recognition of the 50 largest companies in the CB Insights AI 100 Cylance was named in the “50 Companies Leading the AI Revolution” in Fortune Magazine. The magazine chose the largest AI companies from among the most recent CB Insights AI 100 list. Cylance is the only endpoint […]

  • Addressing global cybersecurity challenge, CompTIA unveils groundbreaking certification

    Addressing global cybersecurity challenge, CompTIA unveils groundbreaking certification

    CompTIA Cybersecurity Analyst (CSA+) first to incorporate in-depth behavioural analytics Cybersecurity is unarguably the world’s paramount IT challenge, requiring a highly trained workforce with advanced skills capable of moving beyond traditional approaches. CompTIA has unveiled a groundbreaking, vendor-neutral certification, CompTIA Cybersecurity Analyst (CSA+), the first of its kind to bring behavioural analytics to the forefront […]

  • Frontline Security more »

  • Symantec Security Response: Android ransomware requires victim to speak unlock code

    Symantec Security Response: Android ransomware requires victim to speak unlock code

    Symantec Security Reponse has issued a warning against a new ransomware that is activated verbally, targeting Android phones. The ransomware – a variant of Android.Lockdroid.E – listens to the user and waits for an unlock code to be spoken, instead of the traditional method of typing it in. Once Android.Lockdroid.E infects a device it locks […]

  • Context Warns of Cyber Spy in the Boardroom

    Context Warns of Cyber Spy in the Boardroom

    Security Researchers demonstrate ease of hacking into conference phones to listen in Criminals can gain a treasure trove of sensitive information by listening in to board meetings, suggest security researchers at Context Information Security, who have shown that some conference phone systems might be at risk from hackers.   The Context team managed to gain […]

  • Other Recent Articles

  • The Pace of Trump’s Policy Agenda: Three Big ‘Ifs’

    The Pace of Trump’s Policy Agenda: Three Big ‘Ifs’

    By Libby Cantrill, PIMCO’s head of public policy and a regular contributor to the PIMCO Blog. It’s hard to believe that U.S. President Donald Trump has only been in office for a month, given the dizzying activity in Washington. Yet our observations from before the inauguration seem to be holding true, at least so far: Governing […]

  • Splunk Customers Find Threats Faster with Adaptive Response

    Splunk Customers Find Threats Faster with Adaptive Response

    Splunk and Partners to Demonstrate New Capabilities at RSA Conference 2017 Splunk has announced five new members of the Splunk Adaptive Response Initiative. The growing program, initially announced last year, is a best-of-breed security initiative helping organizations better analyze, assess and respond to advanced attacks within their Security Operations Center (SOC). New members integrate security policy […]

  • Carbon Black only vendor to secure perfect prevention score in NSS Labs’ advanced endpoint protection test - stopped all attacks

    Carbon Black only vendor to secure perfect prevention score in NSS Labs’ advanced endpoint protection test – stopped all attacks

    Carbon Black achieves 100 per cent block rate and 100 per cent on total coverage Carbon Black has announced it achieved 100 per cent block rate and 100 per cent total coverage score in NSS Labs’ Advanced Endpoint Protection (AEP) Test, securing the distinguished rating: “recommended for security effectiveness” by NSS Labs. Carbon Black was the only […]

  • CyberArk Advances Insider Threat Detection to Accelerate Incident Response

    CyberArk Advances Insider Threat Detection to Accelerate Incident Response

    New CyberArk Capabilities Detect and Alert on High-Risk Privileged Activity During User Sessions to Help Security Teams Better Prioritis e Threat Response CyberArk has announced advanced insider threat detection capabilities available through the CyberArk Privileged Account Security Solution to automatically detect and alert on high-risk privileged activity during user sessions and enable rapid response to in-progress […]

  • Symantec Unveils the Industry’s Most Complete Cloud Security Solution to Address the Distinct Security Challenges of the Cloud Generation

    Symantec Unveils the Industry’s Most Complete Cloud Security Solution to Address the Distinct Security Challenges of the Cloud Generation

    The Symantec Cloud Security Platform ensures information security and protects against threats across the cloud spectrum Symantec has introduced new innovations to its Symantec Cloud Security Platform, further extending its leadership as the industry’s most comprehensive cloud security offering. As enterprises embrace cloud applications and infrastructure at an unparalleled rate, Symantec is enabling this transition to […]

  • Cylance names Daniel Doimo as President and Chief Operating Officer

    Cylance names Daniel Doimo as President and Chief Operating Officer

    Appoints global leader and proven business executive to oversee revenue operations, professional services and business development  Cylance has announced that Daniel Doimo has been named President and Chief Operating Officer (COO). Doimo brings extensive management experience and global perspective to Cylance’s executive team during a period of rapid growth and expansion. As President and COO, Doimo […]