This post is also available in: Vietnamese
News & Events
When Should You Start Implementing a Quantum-Safe Solution?
The quantum threat is looming, but we are not exactly sure when it will hit, how serious it will be, or how exactly we should be preparing for it. There is still ongoing development of Quantum-Safe Cryptography, so wouldn’t it be better to wait until Post-Quantum Cryptography (PQC) algorithms are more developed? Let’s find out.
Yubico launches expanded YubiEnterprise Subscription: More choice, faster rollouts and greater peace of mind for enterprises
We’re excited to announce today’s launch of our expanded YubiEnterprise Subscription program, which aims to offer enterprise customers lower cost and value to entry, flexibility, faster rollout and seamless distribution. As cyberattacks continue to escalate at an alarming rate globally, Yubico strives to offer the most impactful way to up-level enterprise security. By equipping organizations with the gold-standard of phishing-resistant, hardware-based authentication with the YubiKey, companies can better protect themselves, their employees, and their customers against malicious hackers.
Introducing the expanded Security Key Series, featuring Enterprise Edition keys (coming soon!) and an updated YubiKey pricing strategy
As part of our YubiEnterprise Subscription announcement, we’re excited to share that we’ll be expanding the Security Key Series lineup to include two new enterprise, FIDO-only (FIDO2/WebAuthn and FIDO U2F) keys.
syslog-ng 101, Part 4: Configuration and testing
This is the fourth part of my syslog-ng tutorial. I hope that since the previous part of my tutorial, you successfully installed syslog-ng. In this part we will finally work with syslog-ng, not just learn about the theoretical background. We will do basic configuration and testing.
Making sense of the alphabet soup within authentication and modern MFA terminology
The vast majority of all cyberattacks start with stolen login passwords or other credentials. In a world that is moving to the cloud, our work, personal and government communication systems have become more accessible and vulnerable for anyone on the internet…
Know Your Vulnerabilities: Key Exchange in Danger
The quantum threat is around the corner. You already know that Post-Quantum Cryptography (PQC) is a cost-effective and practical solution. However, modern data communication cryptosystems used in network protocols like SSH and TLS are complicated and…
How to Recognize and Respond to Emerging Social Media Cybersecurity Threats
Facebook. Twitter. Instagram. LinkedIn. YouTube. Pinterest. Mastodon. The list goes on. Whether you love or loathe social media, these platforms have become integral to how we communicate as individuals and businesses. Cybercriminals have also taken note…
6 IT security predictions for 2023
As I do each year, I recently got together with a number of my very talented colleagues at Quest to think about key trends and lay out our IT predictions for the coming year. Since we specialize in Active Directory and cyber resilience, we were particularly interested in uncovering and exploring the latest trends related to those areas.
2022: A year of phishing with a solution to calm the seas
In 2022, phishing scams continued to hook into consumers and enterprise accounts. In fact, recent research from EMA revealed that 87% of surveyed businesses indicate that their organization experienced an identity-related security breach in the preceding 12 months. Many successes of the sophisticated phishing scams were due to legacy MFA implementations such as SMS, mobile auth, and OTP which aren’t phishing-resistant or equipped to stop these types of attacks.
syslog-ng 101, Part 2: Basic Concepts
Welcome to the second part of the syslog-ng tutorial series. In this part, we cover some of the basic concepts behind syslog-ng. You can watch the video or read the text below.
About Us
From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.
Contact Us
Address
#02-72 WCEGA Tower,
Singapore 658065