This post is also available in: Vietnamese
News & Events
API protection: How to create a fortress around your data
If data is the new oil, APIs are the pipelines through which it flows. If they aren’t secure, the resulting spill can be devastating to a business. In fact, it’s estimated that API insecurity results in a loss of $41 billion-$75 billion annually.
DT Asia 2023 Round-Up
As we bid farewell to the challenges and triumphs of the past year, let us embrace the joyous arrival of the Lunar New Year!
WHY NETWORK LOAD BALANCER MONITORING IS CRITICAL
Your networks are the highways that enable data transfers and cloud-based collaboration. Like highways connect people to physical locations, networks connect people to applications and databases. As you would look up the fastest route between two physical locations, your workforce members need the fastest connectivity between two digital locations. Network load balancers enable you to prevent and identify digital “traffic jams” by redistributing incoming network requests across your servers.
Common barriers to automated patch management and tips to overcome them
As reported software vulnerabilities are reaching record levels, IT teams are grappling with the ongoing grind of keeping endpoints patched and up-to-date. Recent reports detail that while some attacks rely on newly discovered exploits, 50 percent of attacks target vulnerabilities reported before 2017. The never-ending cycle of discovered exploits and the ongoing time, resources and employee hours used to deploy patches to devices places a considerable burden on staff aiming to enhance organizational security. Automated patch management would free up team members to focus on more critical vulnerabilities, but organizations may find that getting to that point may be a bit more challenging than expected.
Building the Human Risk Dream Team
I was inspired by a thread started by Cathy Click, head of Security Awareness at FedEx. She asked a fantastic and inspiring question, what would the perfect Security Awareness / Culture team look like? If I truly wanted to manage my organization’s human risk, who would I need to manage that effort? I felt this was a fantastic question and wanted to share my perspective. I fully realize not all organizations have the resources to support such a diverse team I describe below, but this is something I would love to see organizations strive for.
How to unify all your API assets so they’re easier to consume
Think about your API assets like you would books in a library. Can someone come in and easily find the genre they want? When they find a book they’re interested in, can they flip through it for more information? When they’re ready, is it a straightforward process for them to check out?
The Terrapin Attack Vulnerability in the SSH Protocol – How to Stay Secure
The Secure Shell (SSH) is a widely-used protocol that provides (remote) secure access to servers, services, and applications – and between them for automated file transfers. These connections are measured in the millions per week.
The Critical Role of Central Log Management
With the increased reliance on analytics to drive security operations, IT security professionals are paying particular attention to one of the oldest tools in their toolbox, log management. A recently released report by Gartner focuses on the role of Central Log Management (CLM) in improving threat monitoring and detection, and highlights the challenges of fragmented or incomplete log management environments.
HOW TO CLONE A LAPTOP TO AN EXTERNAL DRIVE
A clone replicates data from one location to another, including files, applications, settings, and even system information and structure to create a byte-by-byte copy. The cloning process can produce backups, reproduce system files, migrate data to a new device, and troubleshoot problems. The experts at Secure Data Recovery, the leader in RAID, SSD, and hard drive recovery, explain how to clone a laptop to an external drive using common tools.
ANNOUNCING GRAYLOG V5.2
We are super excited to announce the release of Graylog 5.2! No matter which Graylog product you’re using, whether it be Graylog Open, Graylog Operations, or Graylog Security, the 5.2 release includes updates that will add value to your day-to-day operations.
About Us
From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.
Contact Us
Address
#02-72 WCEGA Tower,
Singapore 658065