This post is also available in: Vietnamese
News & Events
Entering the New Era of Cybersecurity
Entering the new era of the cybersecurity landscape, it is more important than ever for businesses and organizations to implement robust defensive cybersecurity measures to protect their critical data and communications. The number of cyber-attacks has risen dramatically in recent years, with criminals receiving state-level support. This puts organizations, including government agencies, critical industries and infrastructure, financial institutions, authorities, health institutions, and individual citizens, at great risk.
Forging ahead: A CISOs top recommendations to stay secure in 2023
Last year, we anticipated that 2022 would be challenging for cybersecurity. This was proven true with the countless number of sophisticated high-profile phishing and ransomware attacks like DropBox, Twitter, Rockstar Games and Uber (twice).
Automation in Identity and Access Management and what it means for businesses
As organizations are looking to streamline processes and enhance security, pursuing automation in identity and access management is a key area businesses can target. By pursuing automation in identity and access management, IT teams can free up time to work on more important tasks, and reduce the friction required in managing team member and vendor access across necessary accounts, data and applications.
Need to move to a new Office 365 tenant? Let Quest On Demand Migration do the heavy lifting!
Today we live in a fast-moving world. Mergers and acquisitions are occurring at a record pace. Impacts of the recent pandemic are only likely to increase this trend. Over the past several years many companies have made the move to Office 365 for their email and collaboration needs. Office 365 is a great solution to streamline collaboration and support work from home initiatives, but what happens when it’s time to move? How will Bill from Research & Development be able to look back at previous collaborative ideas in Teams?
Why traditional sanitization methods as specified in DoD 5220.22-M are not sufficient for SSD erasure and can leave recoverable data behind?
The DoD specification was set long ago, when rotating magnetic media hard drives ruled the IT world. To erase these drives, overwriting all data with zeros or random patterns – whatever the standard offered – was enough. But the world changed and entered the age of digitalization, and with it came new hard drives like SSDs (solid state drives).
When Should You Start Implementing a Quantum-Safe Solution?
The quantum threat is looming, but we are not exactly sure when it will hit, how serious it will be, or how exactly we should be preparing for it. There is still ongoing development of Quantum-Safe Cryptography, so wouldn’t it be better to wait until Post-Quantum Cryptography (PQC) algorithms are more developed? Let’s find out.
Yubico launches expanded YubiEnterprise Subscription: More choice, faster rollouts and greater peace of mind for enterprises
We’re excited to announce today’s launch of our expanded YubiEnterprise Subscription program, which aims to offer enterprise customers lower cost and value to entry, flexibility, faster rollout and seamless distribution. As cyberattacks continue to escalate at an alarming rate globally, Yubico strives to offer the most impactful way to up-level enterprise security. By equipping organizations with the gold-standard of phishing-resistant, hardware-based authentication with the YubiKey, companies can better protect themselves, their employees, and their customers against malicious hackers.
Introducing the expanded Security Key Series, featuring Enterprise Edition keys (coming soon!) and an updated YubiKey pricing strategy
As part of our YubiEnterprise Subscription announcement, we’re excited to share that we’ll be expanding the Security Key Series lineup to include two new enterprise, FIDO-only (FIDO2/WebAuthn and FIDO U2F) keys.
syslog-ng 101, Part 4: Configuration and testing
This is the fourth part of my syslog-ng tutorial. I hope that since the previous part of my tutorial, you successfully installed syslog-ng. In this part we will finally work with syslog-ng, not just learn about the theoretical background. We will do basic configuration and testing.
Making sense of the alphabet soup within authentication and modern MFA terminology
The vast majority of all cyberattacks start with stolen login passwords or other credentials. In a world that is moving to the cloud, our work, personal and government communication systems have become more accessible and vulnerable for anyone on the internet…
From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.
#02-72 WCEGA Tower,