Security Archives - Page 11 of 18 - The Tech Revolutionist
Beauty and The Breach: Leaked Credentials in Context

Beauty and The Breach: Leaked Credentials in Context Michael Marriott, Digital Shadows security expert Our most recent research paper looks at credential compromise, finding more than 5 million leaked credentials online for the world’s biggest 1,000 organizations. Of course, not all breached data…

Dell Unveils its Best Mobile Thin Clients Yet with Enterprise-Class Performance and Security

Dell Unveils its Best Mobile Thin Clients Yet with Enterprise-Class Performance and Security ·         Dell Latitude E7270 mobile thin client is the world’s most powerful mobile thin client, designed for processing-intensive applications ·         Dell Latitude 3460 mobile thin client combines security and…

Gemalto and Valeo Partner to Turn Your Smartphone into a Secure Car Key

Gemalto and Valeo Partner to Turn Your Smartphone into a Secure Car Key Paris and Amsterdam, Sept 21, 2016 – (ACN Newswire) – Valeo (Euonext: FR), one of the world’s leading automotive suppliers, has partnered with Gemalto (Euronext NL0000400653 GTO), the world…

Gemalto Releases Findings of First Half 2016 Breach Level Index

Gemalto Releases Findings of First Half 2016 Breach Level Index – Data breaches up 15% and compromised data records up 31% compared to previous six months – Identity and personal data theft account for 64% of all data breaches –…

McAfee Labs Report ‘Follows the Money’ to Assess Criminal Operations Behind Hospital Ransomware

McAfee Labs Report ‘Follows the Money’ to Assess Criminal Operations Behind Hospital Ransomware Investigation Tracks Hospital Ransomware Payments Through Bitcoin Accounts; Ransomware, Mobile, and Macro Malware Threats Surge in Q2 2016 NEWS HIGHLIGHTS Intel Security tracks $100,000 in targeted hospital…

HACKTIVISM, IT’S NOT ALL DOSING AROUND

“It is important not to discount the impact of hacktivists on your infrastructure. But by monitoring hacktivist activity, it’s possible to gain a better appreciation of the day-to-day claims and avoid missing something that could potentially become more damaging,’  said…

Trend Micro Protects Personal Data and Priceless Files with Enhanced Security Software

Trend Micro Protects Personal Data and Priceless Files with Enhanced Security Software     Singapore, September 14, 2016 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in security software, has today reaffirmed its commitment to providing security and peace-of-mind to…

Hitachi Targets $6 Billion Video Security and Monitoring Market With New Video Management Platform Models and Strategic Partnerships

Hitachi Targets $6 Billion Video Security and Monitoring Market With New Video Management Platform Models and Strategic Partnerships Company Teams With Industry Leaders Milestone Systems and OnSSI to Validate and Deliver Robust Video Monitoring and Security Solutions ​ Singapore – September…

BMC Launches New Capabilities for BladeLogic Threat Director to Identify Security Blind Spots and Expand Coverage of Data Centers

BMC Launches New Capabilities for BladeLogic Threat Director to Identify Security Blind Spots and Expand Coverage of Data Centers  Action-focused solution offers first-ever security view of operational blind spots, and accelerates ability to prioritize and remediate network vulnerabilities.  SINGAPORE– September 9, 2016 – BMC, the global leader in IT solutions for…

Hillstone Networks is Positioned in the Gartner’s 2016 Unified Threat Management Magic Quadrant for Third Consecutive Year

Hillstone Networks is Positioned in the Gartner’s 2016 Unified Threat Management Magic Quadrant for Third Consecutive Year Hillstone delivers the right solutions for security-conscious SMB organizations SINGAPORE, 8 September, 2016  – Hillstone Networks, a leading provider of network security solutions, today announced…

Top 5 Trends in Secure Identity

Top 5 Trends in Secure Identity By Alex Tan, Director of Sales, Physical Access Control System, HID Global, ASEAN The integration of wearable technology into our society is bigger than we have ever imagined. The global wearable technology market alone is…

Dropsuite Partners With ICONZ-Webvisions To Help SMEs in Asia Protect Their Data

Dropsuite Partners With ICONZ-Webvisions To Help SMEs in Asia Protect Their Data Brings one-click website, email and server backup to ICONZ-Webvisions’ network of over 40,000 SME customers SINGAPORE, 1 SEPTEMBER 2016 – Dropsuite, a global, cloud based software platform enabling small and medium-sized…

HP Introduces World’s Only Notebooks with Integrated Privacy Screens

HP Introduces World’s Only Notebooks with Integrated Privacy Screens Innovative HP Sure View technology helps combat visual hacking, extends company’s leadership in security SINGAPORE., August 26, 2016 — HP Inc. today unveiled the world’s only PCs with integrated privacy screens[i]. HP…

Trend Micro 1H Security Roundup Report Showcases Evolution of Ransomware and BEC Scams

Trend Micro 1H Security Roundup Report Showcases Evolution of Ransomware and BEC Scams SINGAPORE, August 24, 2016 – As Trend Micro predicted, 2016 has proven to be a year of online extortion through various malicious attack methods. Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader…

Intel Security to expand mobile security technology to Samsung Galaxy Note7 and Tizen OS based Samsung Z2

Intel Security to expand mobile security technology to Samsung Galaxy Note7 and Tizen OS based Samsung Z2 ·        Samsung’s latest Galaxy Note and Tizen OS based Z2 smartphone will come pre-installed with McAfee® VirusScan® mobile security and anti-malware technology ·        New ransomware…

"By Tech Enthusiasts, For Tech Enthusiasts".

The Tech Revolutionist was established in 2012 to bring the latest news from the PC DIY scene to the readers in Singapore. We have now expanded into many other areas in technology, covering a wide scope of topics from lifestyle consumer to enterprise products.

Forget about pretty faces and handsome presenters. Here at The Tech Revolutionist, we go deep into technology to look at how things work, and how it affects the society today.

That's why, our writers are all professionals in the tech industry.

"Think Tech. Speak Tech. Breathe Tech"