This post is also available in: Vietnamese
News & Events
MOST INSIDER DATA LEAKS ARE ACCIDENTAL
Data breaches have become more common today. More importantly, the most newsworthy data breaches that occur are malicious, whether that is an individual or gang involved with ransomware or a disgruntled employee trying to settle a score.
Crisis averted: A recap of the OpenSSH and XZ/liblzma incident
A novel backdoor (CVE-2024-3094) was recently discovered from a widely used xz-utils ‘liblzma’ data compression library build system. This backdoor reportedly targets the OpenSSH server but has the potential to target any application that integrates with ‘systemd’, uses ‘OpenSSL’, and can be contacted from the network. Pending detailed analysis of the malicious binary code injected, the full scope and impact of the backdoor are still unknown.
3 Tips on Securing Your OT Environment in the Age of Digital Transformation
Operational Technology (OT) and manufacturing businesses are prime targets for cybercriminals. Why? Because OT security is lacking behind the IT sector, such as banking and retail.
A Tale of the Three *ishings: Part 1 – What is Phishing?
Phishing has been and will continue to be one of the primary attack methods used by cyber attackers today.
Business Intelligence and Log management – Opportunities and challenges
Business intelligence (BI) is all about making sense of huge amounts of data to extract meaningful and actionable insights out of it. Log management tools such as Graylog, instead, are the perfect solution to streamline data collection and analysis, so it’s easy to understand how these two technologies can make sense when they’re coupled together.
Data replication: What is it and what are the advantages of using it?
Data replication has moved from “nice to have” to “mainstream” for use cases such as High Availability and Disaster Recovery. At the same time, companies are discovering the need to replicate or move data for other reasons, including performance and translating transactional data into events.
Getting data to Splunk
Getting data to Splunk can be challenging. Syslog is still the most important data source, and it can provide you with hard-to-solve problems (for example, like high volume, non-compliant messages, unreliable network protocol (UDP), and more). The syslog-ng Premium Edition (PE) and syslog-ng Store Box (SSB) by One Identity can make these challenges manageable.
Apple Innovates, Securaze Sustains: Supporting Progress and Sustainability in the MacBook Ecosystem
Apple has once again captivated tech enthusiasts with its latest announcement: the introduction of the new 13 and 15-inch MacBook Air models featuring the formidable M3 chip. This unveiling marks a significant leap forward in the evolution of Apple’s lineup, promising enhanced performance and efficiency for users across the globe.
3 steps for API monetization
API monetization can drive significant business growth. It ties back to curating and monetizing your APIs in a marketplace that you build to simplify and increase API adoption.
RISING USB-BORNE CYBERATTACKS RAISE CONCERNS
Portable USB storage drives give users a convenient way to move data between work and home, as well as among computers within an organization. This has been especially true during the COVID-19 pandemic, when stay-at-home protocols forced organizations to shift to remote or hybrid work spaces. That convenience has come at a cost.
About Us
From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.
Contact Us
Address
#02-72 WCEGA Tower,
Singapore 658065