Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

SECURITY HARDWARE AND SOFTWARE NEWS

Top five reasons exploit kits are more dangerous than you think

Feb. 5, 2016 | KEN POHNIMAN, GENERAL MANAGER ASEAN, INFOBLOX

Exploit kit use is on the rise again as indicated by the latest Infoblox DNS Threat Index report which shows a 75% increase in exploit kit related activity in Q3 2015, compared to the same quarter in 2014. Here we look at five reasons why exploit kits are a highly dangerous cyber threat.

Read more...

How can you know if your phone has been compromised?

Feb. 5, 2016 | PARVINDER WALIA, SALES & MARKETING DIRECTOR, ESET APAC

Without proper security measures, users risk losing both their personal data and confidential data from work once their mobile device is compromised. In light of this, Parvinder Walia, Sales and Marketing Director at ESET, Asia Pacific, shares 5 things to look out for in order to find out if your phone has been compromised.

Read more...

BLOGS AND OPINIONS

SECURITY HARDWARE AND SOFTWARE WHITE PAPERS

AFA Shapshot Technology

EMC

This IDC whitepaper discusses use cases and challenges using snapshot technologies in pure hard disk drive (HDD)–based arrays, and explores the advantages of a snapshot implementation from EMC on its XtremIO all-flash array (AFA).

Download

Rethink: Cyber Security

SingTel

Where once prevention was the primary focus of data security, today quick detection and response is more critical. Learn how Singtel can help your organisation anticipate future security trends before it is too late.

Download

MULTIMEDIA