Majority of consumers would stop doing business with companies following a data breach, finds Gemalto · Only a quarter (27%) of consumers feel businesses take customer data security very seriously · While 62% of consumers feel businesses are responsible for data security…
First Half 2017 Breach Level Index Report: Identity Theft and Poor Internal Security Practices Take a Toll
First Half 2017 Breach Level Index Report: Identity Theft and Poor Internal Security Practices Take a Toll Singapore, September 20, 2017 – Gemalto, the world leader in digital security, today released the latest findings of the Breach Level Index, a global database of…
Gemalto releases findings of 2016 Breach Level Index
Gemalto releases findings of 2016 Breach Level Index Almost 1.4 billion data records compromised in 2016 as hackers targeted large-scale databases across industries Singapore – March 28, 2017– Gemalto (Euronext NL0000400653 GTO), the world leader in digital security, today released the…
Hillstone Networks Announces Server Breach Detection System
Hillstone Networks Announces Server Breach Detection System Hillstone sBDS protects the critical assets of internal networks Singapore, 14 February 2017 – Hillstone Networks, a leading provider of network security solutions, today launched Server Breach Detection System (sBDS) to complement its…
Beauty and The Breach: Leaked Credentials in Context
Beauty and The Breach: Leaked Credentials in Context Michael Marriott, Digital Shadows security expert Our most recent research paper looks at credential compromise, finding more than 5 million leaked credentials online for the world’s biggest 1,000 organizations. Of course, not all breached data…
Trend Micro Q3 Security Roundup Report Showcases Vulnerabilities and Aftermath of Data Breaches
Trend Micro Q3 Security Roundup Report Showcases Vulnerabilities and Aftermath of Data Breaches Cracks in the mobile ecosystem, Internet-connected devices and network infrastructure are highlighted Singapore, November 18, 2015 – The interconnectivity of technology has led to a point where many devices…
Trend Micro Discovers MalumPoS; Targets Hotels and other Industries
Trend Micro researchers have discovered MalumPoS, a new PoS attack tool that threat actors can reconfigure to breach any PoS system they wish to target. Currently, it is designed to collect data from PoS systems running on Oracle® MICROS® – a platform…
Commentary from Darktrace on NUS and NTU breaches in Singapore
In response to yesterday afternoon’s news on the NUS and NTU breaches, Sanjay Aurora, MD APAC, Darktrace shares his views on how this breach might have happened and how it can be prevented moving forward. Sanjay Aurora, Managing Director, Asia Pacific,…