News & Events

Defend Against Cyber Threats With Encrypted Drives

Defend Against Cyber Threats With Encrypted Drives

Cyberattacks are increasing in both scale and complexity, making data protection one of the most critical challenges facing organizations today. While traditional security controls — such as firewalls, antivirus software, and network monitoring — continue to play an essential role, they are no longer enough on their own.

read more
Syslog-ng development and AI

Syslog-ng development and AI

Recently, several people have asked about the syslog-ng project’s position on AI. In short, the answer is one of cautious optimism. We are open to using AI, but we do not allow it to take over any critical responsibilities from human developers. What does this approach look like in practice?

read more
Be Prepared: Mobile Phishing Expected to Surge Fourfold During the Holiday Season

Be Prepared: Mobile Phishing Expected to Surge Fourfold During the Holiday Season

Users and organizations should expect a sharp rise in phishing activity in the coming weeks as cybercriminals take advantage of the holiday shopping rush, according to a recent report from Zimperium. The findings show that mobile phishing attacks increase by as much as four times during the festive season, with many campaigns posing as trusted brands and popular online marketplaces such as Amazon and eBay.

read more
Backup Before It Breaks — and Wipe Before You Let Go

Backup Before It Breaks — and Wipe Before You Let Go

Recent findings from heise online have raised serious concerns about a large number of aging Western Digital hard drives, especially from the Blue, Red, and Purple series. These models use Shingled Magnetic Recording (SMR) technology — a method that increases storage capacity by overlapping data tracks like roof tiles.

read more
Gobbling Up Insights: Graylog 7.0 Serves Up a Feast

Gobbling Up Insights: Graylog 7.0 Serves Up a Feast

A feast of new features. A cornucopia of new capabilities. A banquet of breakthroughs (and the T-day puns are just getting started). Graylog 7.0 brings a full plate of advancements that help security teams cut through noise, control cloud costs, and respond with confidence. We’re serving practical improvements across dashboards, automation, and AI support so analysts can focus on action instead of manual effort.

read more
Is a “Good” Monitoring Solution Good Enough?

Is a “Good” Monitoring Solution Good Enough?

Data is now the lifeblood of every modern organization. Ensuring the right data is available to the right people at the right time has become a strategic imperative. At the same time, businesses are under pressure to reduce costs while still enabling growth, maintaining high performance, and delivering exceptional customer experiences.

read more
Introducing New Capabilities: Versasec FIDO2 Enterprise (+ Video Demo)

Introducing New Capabilities: Versasec FIDO2 Enterprise (+ Video Demo)

Passwords continue to be one of the biggest drivers behind identity theft and security breaches. To reduce this risk, organizations are shifting towards passwordless authentication. FIDO2 security keys provide phishing-resistant, passwordless authentication to protect access to sensitive applications, systems, and Windows endpoints.

read more
Benefits of SecureData Remote Management

Benefits of SecureData Remote Management

Data breaches are increasingly common, with recent studies showing that in 2024, over 16.8 billion records were exposed due to data breaches. This equates to about 533 records compromised every second throughout the year. The alarming statistic underscores the critical need for powerful data encryption and efficient management practices. Encrypted drives are storage devices with advanced encryption algorithms, which are vital in protecting sensitive information from unauthorized access. Remote management technology enables users to securely administer these encrypted drives from any location, offering unprecedented levels of convenience.  

read more

About Us

From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.

Contact Us

Address

21 Bukit Batok Crescent,
#02-72 WCEGA Tower,
Singapore 658065

Phone

+65 6266 2877