CIO-Asia
Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

SECURITY NEWS

Top five reasons exploit kits are more dangerous than you think

Feb. 5, 2016 | KEN POHNIMAN, GENERAL MANAGER ASEAN, INFOBLOX

Exploit kit use is on the rise again as indicated by the latest Infoblox DNS Threat Index report which shows a 75% increase in exploit kit related activity in Q3 2015, compared to the same quarter in 2014. Here we look at five reasons why exploit kits are a highly dangerous cyber threat.

Read more...

Rounding out the IoT ecosystem in 2016

Feb. 5, 2016 | GLEN BURROWS, AREA VICE PRESIDENT, DELL OEM, ASIA PACIFIC AND JAPAN

As IoT continues to make headway in Asia Pacific, Glen Burrows of Dell shares his thoughts through this byline on the five big areas of development that we can expect in 2016 when it comes to IoT.

Read more...

CIOs wary of sharing cyberthreat data

Feb. 5, 2016 | CLINT BOULTON

CIOs are still lukewarm to the idea of sharing the cybersecurity threat information the U.S. government is requesting in its Cybersecurity Information Sharing Act. Department of Homeland Security official Andy Ozment reassures IT executives that the feds just want to ‘help you.’

Read more...

How can you know if your phone has been compromised?

Feb. 5, 2016 | PARVINDER WALIA, SALES & MARKETING DIRECTOR, ESET APAC

Without proper security measures, users risk losing both their personal data and confidential data from work once their mobile device is compromised. In light of this, Parvinder Walia, Sales and Marketing Director at ESET, Asia Pacific, shares 5 things to look out for in order to find out if your phone has been compromised.

Read more...

BLOGS AND OPINIONS

A trusted partner

The primary focus for SAS is to build strong and long-lasting relationships with its customers; and its key strategy is proactive and consistent engagement across all customer touch points.

Read more...

SECURITY WHITE PAPERS

Managing Complexity in Identity and Access Management

RSA, The Security Division of EMC

With ever-changing regulations and a growing number of on-premise, cloud and mobile applications, knowing who has access to what and why is more important than ever. This research paper summarised organisations’ perceptions of IAM complexity.

Download

A foundation for next-generation datacentre security

Citrix

The need for robust datacentre security has never been greater, with CIOs having to account for budget constraints, cloud architectures and flat networks with fewer, natural ‘choke points.’ This whitepaper explores the best application delivery controller for building enterprise cloud networks.

Download

Taking Finance Further

Anaplan

FP&A is a crucial component of the CFO’s job, but it is often frustratingly ineffective. As a result, many organisations use the data produced by finance only for compliance; their strategic decision making remains uninfluenced by it.

Download

MULTIMEDIA