This post is also available in: Vietnamese
News & Events
Syslog-ng 101, part 5: Sources
This is the fifth part of my syslog-ng tutorial. Last time we had an overview of the syslog-ng configuration and had our first steps working with syslog-ng. Today we learn about syslog-ng source definitions and how to check the syslog-ng version and its enabled features.
Building strong partnerships in Bangkok together with SSH
Quote from SSH:
”Active collaboration is the key. And we are always excited to meet with our partners and plan what the future holds for us together.”
The journey continues – working together towards strong partnerships in Jakarta!
The journey continues – working together towards strong partnerships in Jakarta!
SSH launches new version of Tectia to provide Quantum-Safe communications for US federal government
Helsinki, Finland – March 16, 2023 – The US federal government has shown significant interest in Quantum-Safe communications during 2022, most evidently through Quantum Cybersecurity Preparedness Act, which mandates all electronic communications to be Quantum-Safe after a transition period. The federal government acts as a transformation leader that is followed by other actors in the public sector and even private enterprises.
Let’s Discuss Data Sanitization: Misconceptions, Misinformation, Reality.
In the digital age, concerns about data management and privacy are ever-increasing as the volume of data is increasing exponentially. As regulatory compliance and concerns about data privacy grow, it is the job of the IT industry to ensure data security, preventing leakage, through proper implementation of data sanitization procedures and tools.
YubiHSM 2, the world’s smallest hardware security module, enhanced with new features to support security for the Public Sector
Compliance mandates require many of our customers in regulated industries or in high-risk environments to prove adequate levels of protection for their data, no matter where it lives or travels. This is why we’ve continued to enhance the capabilities of both the YubiHSM 2 and YubiHSM 2 FIPS, the world’s smallest FIPS-validated and non-FIPS hardware security modules (HSMs). Today, we’re also excited to share that the YubiHSM 2 FIPS now meets FIPS 140-2, Level 3. Jump ahead to the “what’s new” section below to learn about the key new features in our YubiHSM 2 products.
10 Microsoft service account best practices
Microsoft service accounts are a critical part of any Windows ecosystem because they are used to run essential services and applications, from web servers to mail transport agents to databases. But all too often, they are not used and managed properly — which leaves the organization at unnecessary risk of business disruptions, security breaches and compliance failures. Indeed, problems with service accounts are one of the top four issues that we at Quest uncover during security assessments.
Fostering strong partnerships in Hong Kong
DT Asia is delighted to have a happy reunion with the local partners in Hong Kong from 28 February to 3 March, after more than two years of COVID-19 pandemic.
Building strong partnerships in Bangkok together with SSH
DT Asia comes together’ with SSH Communication Security, to visit the local partners in Bangkok on 1-3 February.
A happy reunion with Hewlett Packard’s leadership
“Leaping into the Prosperous Year of Rabbit” – DT Asia hopped to a reunion with Hewlett-Packard’s leadership at their Channel Partner CNY Luncheon on 27 January.
About Us
From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.
Contact Us
Address
#02-72 WCEGA Tower,
Singapore 658065