• Featured more »

  • Are security vendors leaving your business at risk?

    Are security vendors leaving your business at risk?

    An issue that I’ve been mulling over for some time relates to the fundamental nature of customer security engagements, especially concerning product vendors and their place as trusted advisors. This issue led me to a couple of conclusions. Firstly, there is a mismatch between what’s best for the client and what’s best for the vendor. […]

  • Fighting technology with technology: protecting children from cyber bullies

    Fighting technology with technology: protecting children from cyber bullies

    Technology has altered the way we live. This goes for both positive interactions with technology, such as keeping in touch with family overseas, as well as the negative aspects, such as cyber bullying, cyber stalking and cyber terrorism. Cyber bullying is no different to traditional bullying, aside from it leveraging technology. Cyber bullies use of […]

  • Asia Pacific Security more »

  • Islamic State Lost Almost a Quarter of Its Territory in 2016, IHS Markit Says

    Islamic State Lost Almost a Quarter of Its Territory in 2016, IHS Markit Says

    Group likely to lose governance structures in Iraq this year; Mosul to fall by second half of this year Territory controlled by the Islamic State shrunk by almost a quarter in 2016, according to new analysis has released by IHS Markit. In 2016, the Islamic State’s caliphate shrunk by 23 percent from 78,000 km2 in […]

  • Asia’s leading and award winning IoT event returns in March 2017

    Asia’s leading and award winning IoT event returns in March 2017

    As the first dedicated platform in Asia to address the enormous potential of the IoT revolution, the first edition of IoT Asia in 2014 was ahead of its competition. It was seen as a transformational platform for addressing challenges and identifying real opportunities within the IoT landscape. IoT Asia 2016 surpassed expectations and broke records. […]

  • Tech Time more »

  • Cloud-Optimizing Your Network? Here’s Where to Start

    Cloud-Optimizing Your Network? Here’s Where to Start

    By Daniel Kwan, Vice President and General Manager of Asia Pacific excluding Japan, Sonus Within a few years, analysts predict that enterprise applications will be in the Cloud more than out of it, passing the halfway mark—that is, more than half of all business apps will be in the Cloud—somewhere around 2020. In Asia Pacific, […]

  • SimpliVity and Huawei join forces to deliver game-changing hyperconvergence around the globe and accelerate international growth

    SimpliVity and Huawei join forces to deliver game-changing hyperconvergence around the globe and accelerate international growth

    SimpliVity has announced that its transformative OmniStack technology is now available for sale on Huawei FusionServer. OmniStack with Huawei FusionServer is offered on SimpliVity’s all-flash hyperconverged models, providing the speed and reliability of all-flash with the efficiency, ease of use, and resiliency of SimpliVity’s top hyperconverged platform. Huawei is a leading global information and communications technology (ICT) […]

  • Other Recent Articles

  • Oracle and PwC Team Up to Offer Unparalleled IFRS 9 Compliance Expertise

    Oracle and PwC Team Up to Offer Unparalleled IFRS 9 Compliance Expertise

    This Collaboration Enables Banks to More Easily Navigate Adoption of New Reporting Standard Oracle Financial Services Analytical Applications and PwC have announced a global collaboration to offer premium technology, implementation and consulting solutions to help financial institutions meet near-term and ongoing compliance with the International Accounting Standards Board’s (IASB) new IFRS9 and FASB’s proposed CECL […]

  • ESET Discovered a Variant of the Destructive KillDisk Malware that Encrypts Linux Machines

    ESET Discovered a Variant of the Destructive KillDisk Malware that Encrypts Linux Machines

    ESET Discovered a Variant of the Destructive KillDisk Malware that Encrypts Linux Machines The new variant of KillDisk encrypts Linux machines, making them unbootable with data permanently lost. Despite the fact that the malware’s design doesn’t allow for the recovery of encrypted files, as encryption keys are neither stored nor sent anywhere, the criminals behind […]

  • Into the Unknown: Key Takeaways

    Into the Unknown: Key Takeaways

    By Joachim Fels, PIMCO’s global economic advisor and a regular contributor to the PIMCO Blog. PIMCO recently published its Cyclical Outlook for global growth, inflation, trends and transitions likely to affect the investment landscape in 2017. Below are some key takeaways: With Trump, Brexit, Italy’s “No” vote and China’s currency woes, the world economy and markets have embarked […]

  • Trend Micro Named as a Leader in IDC MarketScape on Worldwide Email Security

    Trend Micro Named as a Leader in IDC MarketScape on Worldwide Email Security

    Trend Micro Incorporated has been named a Leader in the IDC MarketScape: Worldwide Email Security 2016 Vendor Assessment (doc #US41943716, December 2016). “Trend Micro is placed in the Leaders category in this [year’s] IDC MarketScape for making its messaging product a prominent part of its security suite, which also includes its endpoint, web, encryption, mobile, […]

  • New Asia Voice For International Holography Body

    New Asia Voice For International Holography Body

    THE International Hologram Manufacturers Association (IHMA), which represents the global hologram industry, has appointed its first chairman from Asia. The appointment of Manoj Kochar, founder and director of India-based Holoflex, comes in the face of continuing demand for authentication and brand protection holograms, which provide effective security devices to counter global threats. The Asia region […]

  • Senstar Introduces New Version Of Fiberpatrol-ZR

    Senstar Introduces New Version Of Fiberpatrol-ZR

    Longer detection capability provides customers with more protection options Senstar has announced a new version of FiberPatrol-ZR, its zone-reporting fiber optic fence-mounted intrusion detection system. The new version doubles the detection capabilities of the original system to 5 km (3.1 mi) per processor. “This new version of FiberPatrol-ZR provides additional perimeter length options for customers looking […]

  • Proofpoint Finds Phishing Actors Take a Cue From Malware-Distributing Brethren

    Proofpoint Finds Phishing Actors Take a Cue From Malware-Distributing Brethren

    Proofpoint researchers have observed a number of email campaigns with attached password-protected malicious documents. These documents are primarily used to distribute malware including Cerber ransomware and the Ursnif banking Trojan, with document passwords included in the body of the email. The use of password-protected documents makes them difficult to execute in automated sandbox environments, circumventing […]