This post is also available in: Vietnamese

News & Events

Know Your Vulnerabilities: Key Exchange in Danger

Know Your Vulnerabilities: Key Exchange in Danger

The quantum threat is around the corner. You already know that Post-Quantum Cryptography (PQC) is a cost-effective and practical solution. However, modern data communication cryptosystems used in network protocols like SSH and TLS are complicated and…

read more
6 IT security predictions for 2023

6 IT security predictions for 2023

As I do each year, I recently got together with a number of my very talented colleagues at Quest to think about key trends and lay out our IT predictions for the coming year. Since we specialize in Active Directory and cyber resilience, we were particularly interested in uncovering and exploring the latest trends related to those areas.

read more
2022: A year of phishing with a solution to calm the seas

2022: A year of phishing with a solution to calm the seas

In 2022, phishing scams continued to hook into consumers and enterprise accounts. In fact, recent research from EMA revealed that 87% of surveyed businesses indicate that their organization experienced an identity-related security breach in the preceding 12 months. Many successes of the sophisticated phishing scams were due to legacy MFA implementations such as SMS, mobile auth, and OTP which aren’t phishing-resistant or equipped to stop these types of attacks.

read more
syslog-ng 101, Part 2: Basic Concepts

syslog-ng 101, Part 2: Basic Concepts

Welcome to the second part of the syslog-ng tutorial series. In this part, we cover some of the basic concepts behind syslog-ng. You can watch the video or read the text below.

read more
syslog-ng 101, Part 1: Introduction

syslog-ng 101, Part 1: Introduction

Welcome to the first part of the syslog-ng tutorial series. This part gives you a quick introduction to what to expect from this series and tries to define what syslog-ng is.

read more
You Don’t Need New Fiber Cables to Be Quantum-Safe

You Don’t Need New Fiber Cables to Be Quantum-Safe

You might already know a lot about the quantum threat, or you might just have heard of it. You might know that there are remedies that would make you quantum-safe. However, you might not know that there is a wide variety of alternatives. Which one is the right one for your organization? Let’s find out.

read more
Hello, Quantum-Safe World!

Hello, Quantum-Safe World!

Quantum computers are no longer science fiction. Their computation power is increasing by leaps and bounds both in terms of the number of usable qubits and optimization in error correction. The recent advances and heavy investment only accelerate the progress.  

read more

About Us

From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.

Contact Us

Address

21 Bukit Batok Crescent,
#02-72 WCEGA Tower,
Singapore 658065

Phone

+65 6266 2877