CIO-Asia
Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

SECURITY HARDWARE AND SOFTWARE NEWS

How can you know if your phone has been compromised?

Feb. 5, 2016 | PARVINDER WALIA, SALES & MARKETING DIRECTOR, ESET APAC

Without proper security measures, users risk losing both their personal data and confidential data from work once their mobile device is compromised. In light of this, Parvinder Walia, Sales and Marketing Director at ESET, Asia Pacific, shares 5 things to look out for in order to find out if your phone has been compromised.

Read more...

Top five reasons exploit kits are more dangerous than you think

Feb. 5, 2016 | KEN POHNIMAN, GENERAL MANAGER ASEAN, INFOBLOX

Exploit kit use is on the rise again as indicated by the latest Infoblox DNS Threat Index report which shows a 75% increase in exploit kit related activity in Q3 2015, compared to the same quarter in 2014. Here we look at five reasons why exploit kits are a highly dangerous cyber threat.

Read more...

BLOGS AND OPINIONS

SECURITY HARDWARE AND SOFTWARE WHITE PAPERS

BCM Regulatory Soup

RSA, The Security Division of EMC

This business continuity white paper will help you address which sources to comply with and why, how to handle conflicts between the sources, how to prioritize your efforts.

Download

Taking Finance Further

Anaplan

FP&A is a crucial component of the CFO’s job, but it is often frustratingly ineffective. As a result, many organisations use the data produced by finance only for compliance; their strategic decision making remains uninfluenced by it.

Download

MULTIMEDIA