This post is also available in: Vietnamese

News & Events

Security Awareness and Log Management for Security Analysts

Security Awareness and Log Management for Security Analysts

In today’s remote working environment, security professionals need specialized technical security awareness education that goes beyond the standard “don’t click a phishing link” training provided to the rest of the company. While security analysts are adept at recognizing phishing emails and setting secure passwords, their cybersecurity awareness must extend to optimizing log management strategies to keep pace with evolving threat actors.

read more
Benefits of NetFlow Optimizer

Benefits of NetFlow Optimizer

NetFlow data is essential for enhancing network security and streamlining IT operations. It provides a detailed view of network traffic, enabling organizations to proactively detect security threats, monitor user activity, and gather valuable insights for effective network management and optimization. With comprehensive visibility into network traffic patterns, NetFlow data empowers security teams and IT operations to maintain a robust and secure network environment while boosting the overall performance and efficiency of the network infrastructure.

read more
Why use a http()-based destination in syslog-ng?

Why use a http()-based destination in syslog-ng?

Logging has evolved significantly from the traditional syslog days. Despite this, many syslog-ng users continue to rely on syslog protocols for log transport and flat files for log storage. While most SIEMs and log analytics tools can receive syslog messages or read them using their agents, you can often leverage the http() destination of syslog-ng to send logs. This method offers high performance and a simpler architecture to maintain.

read more
MOST INSIDER DATA LEAKS ARE ACCIDENTAL

MOST INSIDER DATA LEAKS ARE ACCIDENTAL

Data breaches are becoming alarmingly common, with many high-profile cases involving malicious actors like ransomware gangs or disgruntled employees. These cyberattacks often target large companies, demanding ransom amounts that can reach millions of dollars. Unfortunately, even when companies pay, it rarely guarantees the restoration of their data. This highlights the serious threat posed by cybercriminals exploiting technological vulnerabilities, leading to significant impacts on both employee and customer data. Beyond media headlines, it’s crucial to understand the mechanisms and true costs of data breaches.

read more
A Tale of the Three *ishings: Part 3 – What is Vishing?

A Tale of the Three *ishings: Part 3 – What is Vishing?

Over the past two decades, the security industry has made significant strides in using technology to secure technological assets. However, the human factor in cybersecurity often remains overlooked. Consequently, cyber attackers have shifted their focus from targeting technology to targeting people. Among the various methods they employ, the three most common are phishing, smishing, and vishing. This blog series delves into these methods, the tactics and techniques used by cyber attackers, and how you can protect yourself.

read more
NetFlow Optimizer

NetFlow Optimizer

NetFlow Optimizer™ (NFO) is a software-only processing engine for network flow data. It accepts NetFlow, IPFIX, sFlow, J-Flow from network devices (routers, switches, firewalls, virtual networks), and Cloud Flow Logs (AWS VPC, Microsoft Azure, Oracle OCI, and Google VPC). It provides real-time network monitoring and enables advanced level of operational intelligence and security for virtual and physical networks.

read more
Crucial backup strategies to defend against ransomware attacks

Crucial backup strategies to defend against ransomware attacks

Ransomware payouts are trending back up. According to Chainalysis, a cryptocurrency tracing firm, 2021 was a record year for ransomware payments, totaling almost $1 billion. In 2022, there was a drop, but in 2023, ransomware payouts returned to that same torrid pace with an estimated $900 million in payments. This rise in ransomware activity can be attributed to the ramping up of ransomware group operations and a surge in extortion efforts. To avoid becoming a victim and defend against ransomware threats, you need a strong backup plan that takes into account the many ways that attackers can infiltrate your network.

read more

About Us

From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.

Contact Us

Address

21 Bukit Batok Crescent,
#02-72 WCEGA Tower,
Singapore 658065

Phone

+65 6266 2877