This post is also available in: Vietnamese

News & Events

syslog-ng 101, Part 4: Configuration and testing

syslog-ng 101, Part 4: Configuration and testing

This is the fourth part of my syslog-ng tutorial. I hope that since the previous part of my tutorial, you successfully installed syslog-ng. In this part we will finally work with syslog-ng, not just learn about the theoretical background. We will do basic configuration and testing.

read more
Know Your Vulnerabilities: Key Exchange in Danger

Know Your Vulnerabilities: Key Exchange in Danger

The quantum threat is around the corner. You already know that Post-Quantum Cryptography (PQC) is a cost-effective and practical solution. However, modern data communication cryptosystems used in network protocols like SSH and TLS are complicated and…

read more
6 IT security predictions for 2023

6 IT security predictions for 2023

As I do each year, I recently got together with a number of my very talented colleagues at Quest to think about key trends and lay out our IT predictions for the coming year. Since we specialize in Active Directory and cyber resilience, we were particularly interested in uncovering and exploring the latest trends related to those areas.

read more
2022: A year of phishing with a solution to calm the seas

2022: A year of phishing with a solution to calm the seas

In 2022, phishing scams continued to hook into consumers and enterprise accounts. In fact, recent research from EMA revealed that 87% of surveyed businesses indicate that their organization experienced an identity-related security breach in the preceding 12 months. Many successes of the sophisticated phishing scams were due to legacy MFA implementations such as SMS, mobile auth, and OTP which aren’t phishing-resistant or equipped to stop these types of attacks.

read more
syslog-ng 101, Part 2: Basic Concepts

syslog-ng 101, Part 2: Basic Concepts

Welcome to the second part of the syslog-ng tutorial series. In this part, we cover some of the basic concepts behind syslog-ng. You can watch the video or read the text below.

read more
syslog-ng 101, Part 1: Introduction

syslog-ng 101, Part 1: Introduction

Welcome to the first part of the syslog-ng tutorial series. This part gives you a quick introduction to what to expect from this series and tries to define what syslog-ng is.

read more

About Us

From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.

Contact Us

Address

21 Bukit Batok Crescent,
#02-72 WCEGA Tower,
Singapore 658065

Phone

+65 6266 2877