Did you know that despite being equipped with new applications and hardware, most Internet of Things (IoT) devices are furnished with outdated connection protocols and operating systems (OS)? (this is good) When exploited, it can open up the device to remote access by hackers.…
Centrify and Cloudera Extend Open Data Model for Cybersecurity
Centrify and Cloudera Extend Open Data Model for Cybersecurity Growing Community Continues to Meet Enterprise Demand for Apache Hadoop-Based Cybersecurity Solutions Singapore, August 1, 2016 — Cloudera, the global provider of the fastest, easiest, and most secure data management and analytics platform built…
EVVO Cybersecurity launches first automated Security Operations Centre in Singapore
EVVO Cybersecurity launches first automated Security Operations Centre in Singapore Centre to leverage automation software to increase productivity, will cater to SMEs and integrate cybersecurity analytics platform EVVO360 Singapore, 22 July, 2016 – EVVO Cybersecurity, a Singapore cybersecurity vendor…
McAfee Labs Report Reveals New Mobile App Collusion Threats
McAfee Labs Report Reveals New Mobile App Collusion Threats Delayed Software Updates Enable Cybercriminals to Exploit Mobile Apps; Pinkslipbot Trojan Returns with New Capabilities NEWS HIGHLIGHTS · McAfee Labs identifies more than 5,000 versions of 21 consumer mobile apps containing colluding code…
IBM & Ponemon Institute Study: Data Breach Costs Rising, Now $4 million per Incident Results Show “Time is Money” When Responding to a Data Breach Incident Response Teams Lead to Significant Cost Savings
IBM & Ponemon Institute Study: Data Breach Costs Rising, Now $4 million per Incident Results Show “Time is Money” When Responding to a Data Breach Incident Response Teams Lead to Significant Cost Savings Image : Sailpoint.com SINGAPORE – 16 Jun 2016 – IBM…
Malware Infection Index 2016 Highlights Key Threats Undermining Cybersecurity in Asia Pacific: Microsoft Report
Malware Infection Index 2016 Highlights Key Threats Undermining Cybersecurity in Asia Pacific: Microsoft Report Top three encountered malicious software in the region include Gamarue, Skeeyah and Peals SINGAPORE – 7 JUNE 2016 – Microsoft Asia today announced the launch of its Malware…
SYMANTEC ANNOUNCES ENCRYPTION EVERYWHERE
SYMANTEC ANNOUNCES ENCRYPTION EVERYWHERE · Global Leader in Cybersecurity Calls on Website Owners and Web Hosting Providers to Secure All Legitimate Web Traffic by 2018 · With only 3% of today’s websites encrypted, Symantec offers clear path to help secure sites easily…
IBM Watson to Tackle Cybercrime
IBM Watson to Tackle Cybercrime Eight Leading Universities to Help Train Watson for Cyber Security SINGAPORE – 10 May 2016 – IBM Security (NYSE: IBM)today announced Watson for Cyber Security, a new cloud-based version of the company’s cognitive technology trained on the language of…
Why are you still paying for antivirus?
Why are you still paying for antivirus? Kane Lightowler, Managing Director, Asia Pacific & Japan, Carbon Black Singapore, Japan and Malaysia have singled out cyber-attack as the risk of highest concern according to the World Economic Forum’s 2016 Global…
OneSecure Acquired by EvvoLabs, Rebrands as EVVO Cybersecurity
OneSecure Acquired by EvvoLabs, Rebrands as EVVO Cybersecurity Acquisition of OneSecure to see comprehensive suite of services and solutions available for existing customers Singapore, 18 April, 2016 – OneSecure Asia Pte Ltd, a cybersecurity vendor and provider with specialties in DDoS mitigation solutions, today…
McAfee Labs Report Finds Only 42 Percent of Surveyed Cybersecurity Professionals Use Shared Threat Intelligence
McAfee Labs Report Finds Only 42 Percent of Surveyed Cybersecurity Professionals Use Shared Threat Intelligence Survey of 500 Cybersecurity Professionals Gauges Adoption and Perceived Value of Cyber Threat Intelligence Sharing in Enterprise Cybersecurity; New Ransomware Surges 26 Percent in Q4…
Self-interest not regulation needs to drive cybersecurity, says new ACCA report
Self-interest not regulation needs to drive cybersecurity, says new ACCA report Pace of technological change reduces usefulness of law SINGAPORE,March 10 2016 – A new report from ACCA (the Association of Chartered Certified Accountants) claims self-interest rather than regulation is the…
Trend Micro 2015 Security Roundup Details Top Breaches, Vulnerabilities and Cyber Underground
Trend Micro 2015 Security Roundup Details Top Breaches, Vulnerabilities and Cyber Underground Singapore, March 9, 2016 – Today, Trend Micro Incorporated (TYO: 4704; TSE: 4704) released its annual security roundup report,“Setting the Stage: Landscape Shifts Dictate Future Threat Response Strategies,” which dissects the most significant security…
Cloudera Announces Open Network Insight and Open Data Model to Accelerate Apache Hadoop-Based Advanced Analytics Solutions in the Cybersecurity Community
Cloudera Announces Open Network Insight and Open Data Model to Accelerate Apache Hadoop-Based Advanced Analytics Solutions in the Cybersecurity Community Growing portfolio of cybersecurity ISVs and GSIs choose Cloudera’s enterprise data hub to deliver advanced cybersecurity analytics solutions Singapore, March 2,…
HITACHI DATA SYSTEMS SURVEY REVEALS PUBLIC SAFETY IS CENTRAL TO BECOMING A SMART CITY
HITACHI DATA SYSTEMS SURVEY REVEALS PUBLIC SAFETY IS CENTRAL TO BECOMING A SMART CITY Survey Reinforces the Significance of Public Safety Initiatives in Smart City Planning Across Asia Pacific SINGAPORE, June 30, 2015 – Hitachi Data Systems Corporation (HDS), a…