Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

SECURITY HARDWARE AND SOFTWARE NEWS

How can you know if your phone has been compromised?

Feb. 5, 2016 | PARVINDER WALIA, SALES & MARKETING DIRECTOR, ESET APAC

Without proper security measures, users risk losing both their personal data and confidential data from work once their mobile device is compromised. In light of this, Parvinder Walia, Sales and Marketing Director at ESET, Asia Pacific, shares 5 things to look out for in order to find out if your phone has been compromised.

Read more...

Top five reasons exploit kits are more dangerous than you think

Feb. 5, 2016 | KEN POHNIMAN, GENERAL MANAGER ASEAN, INFOBLOX

Exploit kit use is on the rise again as indicated by the latest Infoblox DNS Threat Index report which shows a 75% increase in exploit kit related activity in Q3 2015, compared to the same quarter in 2014. Here we look at five reasons why exploit kits are a highly dangerous cyber threat.

Read more...

BLOGS AND OPINIONS

SECURITY HARDWARE AND SOFTWARE WHITE PAPERS

The State of Mobile Application Insecurity

IBM

Customer need and demand often affect mobile application security. The “rush to release” phenomenon challenges an organization’s ability to address the risks of data leakage and malware. What are other organizations doing to combat mobile security challenges?

Download

Eliminating The Challenge Of Branch Recovery

Riverbed

A new branch converged infrastructure approach allows IT to project virtual servers and data to the edge, providing for local access and performance while data is actually stored in centralized data centers.

Download

MULTIMEDIA