Author Archive for APSM

Red Hat Unveils Industry’s First Production-Ready Open Source Hyperconverged Infrastructure

Red Hat Unveils Industry’s First Production-Ready Open Source Hyperconverged Infrastructure

Red Hat debuts integrated, software-defined compute and storage platform designed for remote sites and edge deployments Red Hat has introduced Red Hat Hyperconverged Infrastructure, the industry’s first production-ready fully open source hyperconverged infrastructure (HCI) solution. By combining innovative virtualization and storage technologies with a stable, proven operating platform, Red Hat Hyperconverged Infrastructure is designed to help […]

Children of war: The rise of a nation of young Jihadists

Children of war: The rise of a nation of young Jihadists

Thousands of Syrian children affected by trauma, unwanted by the international community, and courted by Islamic extremists may be cornered into jihadism. According to the NGO Save the Children at least a quarter of a million Syrian children are living ‘under brutal siege’. Their homes ‘have effectively been turned into open-air prisons’ where they endure […]

Is the criminal law on terrorism financing too tough?

Is the criminal law on terrorism financing too tough?

The global community must maintain a tough legislative stance to contain the influence of terrorists who use their contributions to humanitarian activities to win over the hearts and minds of local communities. The Independent Reviewer of Terrorism Legislation in the UK, David Anderson QC, in his fourth report on terrorism financing legislation highlighted the negative […]

We must do more in the digital war against Islamic State

We must do more in the digital war against Islamic State

Cyberspace is now officially a war zone, and Islamic State (IS) has the capability to dominate the virtual front line. Abu Bakr al-Baghdadi, the leader of IS, has it all figured out. His slick social media campaign has put the terrorist group out in front in this critical future battleground. Now, IS can have a […]

Cyber Insurance: Is it time to start the conversation?

Cyber Insurance: Is it time to start the conversation?

B usinesses are investing in security to manage cyber risk. They wish to safeguard the digital boundaries of their enterprises to prevent external agents from finding a way through their cyber defences. External agents, on the other hand, are continuously trying to access the digital networks, assets and transactions of businesses for malicious gains. Such […]

HURRY: S$300 Early Bird discount returns for 24 hours

HURRY: S$300 Early Bird discount returns for 24 hours

For the next 24 hours, Early Bird pricing has returned to RSA Conference 2017 Asia Pacific & Japan. This is your last chance to save S$300 on a Full Conference Pass*. Register today with discount code 8A7JN22FC so you can lock in your place at the region’s most important and relevant information security conference. Actionable […]

GhostHook – Bypassing PatchGuard with Processor Trace Based Hooking

GhostHook – Bypassing PatchGuard with Processor Trace Based Hooking

In this article, we’ll present a new hooking technique that we have found during our research work. Hooking techniques give you the control over the way an operating system or a piece of software behaves. Some of the software that utilizes hooks include: application security solutions, system utilities, tools for programming (e.g. interception, debugging, extending […]

VMware NSX Meets Stringent Government Security Standards with Common Criteria Certification

VMware NSX Meets Stringent Government Security Standards with Common Criteria Certification

VMware NSX Enables New Levels of Security, IT Automation and Application Continuity To Government Organisations VMware has announced that VMware NSX has achieved the Common Criteria Evaluation Assurance Level (EAL) 2+ certification under the Common Criteria Evaluation and Certification Scheme. The certification validates that VMware NSX satisfies stringent government security standards and requirements for deployment. VMware NSX enables Federal […]

G2E Asia 2017 Has Record-Breaking Growth

G2E Asia 2017 Has Record-Breaking Growth

G2E Asia 2017, the marketplace for the Asian gaming industry, held in Macau from May 16 to May 18, was the largest edition in the show’s history. Marking another year of setting new records across several key areas: The show spanned 28,000 sqm of exhibition space – 27% increase over last year; The total number […]

(ISC)² Announces 2017 Asia-Pacific Information Security Leadership Achievements (ISLA) Honorees

(ISC)² Announces 2017 Asia-Pacific Information Security Leadership Achievements (ISLA) Honorees

ISLA Gala to be held concurrently with (ISC)2 Security Congress APAC July 3-4 in Hong Kong (ISC)² has announced the honorees for its 11th annual Asia-Pacific Information Security Leadership Achievements (ISLA) Program. (ISC)² will recognize 24 honorees and announce six showcased workforce initiatives, as well as a community service star at a gala dinner and ceremony […]

  • Categories

  • RSS Travel Advice

  • RSS My Security TV