This post is also available in: Vietnamese

News & Events

Security Awareness Training ROI: Part 2 Of 3

Security Awareness Training ROI: Part 2 Of 3

If you haven’t read Part 1 of our Security Awareness Training ROI, you can here. In it, we discussed the high-level overview of why security awareness training should be a vital part of any company’s cybersecurity strategy and how to get the best security awareness training ROI.

read more
Active Directory Cyber Resiliency

Active Directory Cyber Resiliency

Reduce Cyber Risk for your organization

In 2021, 25 billion attacks on Azure AD accounts were reported. Your organization Active Directory (AD) security sits as your organization’s cornerstone, but it’s also every cyber villain’s favorite target whom can control your AD and then your entire enterprise.

read more
Syslog-ng 101, part 6: Destinations and log path

Syslog-ng 101, part 6: Destinations and log path

This is the sixth part of my syslog-ng tutorial. Last time, we learned about syslog-ng source definitions and how to check the syslog-ng version. Today, we learn about syslog-ng destinations and the log path. At the end of the session, we will also perform a quick syntax check.

read more
White Paper: How to configure syslog-ng™ PE to cooperate with Splunk

White Paper: How to configure syslog-ng™ PE to cooperate with Splunk

Splunk is a popular search and analysis platform. Many users of Splunk also have syslog-ng™ deployed in their environments. This guideline describes scenarios in which Splunk users can benefit from syslog-ng™ Premium Edition features and offers some technical guidance to optimize the syslog-ng™ configuration.

read more
SSH in the World of Post-Quantum Cryptography (PQC)

SSH in the World of Post-Quantum Cryptography (PQC)

Nowadays, advances in quantum computing are moving at a neck-breaking pace. Giants in the field have been faithfully executing roadmaps and delivering on milestones laid out several years ago. And while it is hard to predict when the advances will reach their breaking point, the threat to classical, public key cryptography is getting closer.  

read more
Yubico Channel Awards 2022

Yubico Channel Awards 2022

Quote from Yubico:
‘‘Congratulations on the award! Thank you for your partnership over the last several years, we are looking forward to many more joint successes!”

“Congratulations Team DTA! It is our pleasure working and growing with your Team.”

read more
Understanding attack paths targeting Active Directory

Understanding attack paths targeting Active Directory

Attack paths are at the forefront of cybersecurity discussions today. But exactly what is an attack path? Why is Active Directory (AD) particularly vulnerable? And what can you do to protect your organization? This blog post covers all these questions and more.

read more

About Us

From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.

Contact Us

Address

21 Bukit Batok Crescent,
#02-72 WCEGA Tower,
Singapore 658065

Phone

+65 6266 2877