This post is also available in:
Vietnamese
News & Events
Crisis averted: A recap of the OpenSSH and XZ/liblzma incident
Recently, a new backdoor (CVE-2024-3094) was uncovered within the build system of the widely utilized xz-utils ‘liblzma’ data compression library. This backdoor is purportedly aimed at the OpenSSH server but has the capability to affect any application that interacts with ‘systemd’, utilizes ‘OpenSSL’, and is accessible over the network. The complete extent and consequences of the backdoor remain unclear pending a thorough analysis of the injected malicious binary code.
3 Tips on Securing Your OT Environment in the Age of Digital Transformation
Operational Technology (OT) and manufacturing businesses are prime targets for cybercriminals. Why? Because OT security is lacking behind the IT sector, such as banking and retail.
A Tale of the Three *ishings: Part 1 – What is Phishing?
Phishing remains and will remain one of the foremost methods used by cyber attackers today.
Business Intelligence and Log management – Opportunities and challenges
Business intelligence (BI) is all about making sense of huge amounts of data to extract meaningful and actionable insights out of it. Log management tools such as Graylog, instead, are the perfect solution to streamline data collection and analysis, so it’s easy to understand how these two technologies can make sense when they’re coupled together.
Data replication: What is it and what are the advantages of using it?
Data replication has moved from “nice to have” to “mainstream” for use cases such as High Availability and Disaster Recovery. At the same time, companies are discovering the need to replicate or move data for other reasons, including performance and translating transactional data into events.
Getting data to Splunk
Getting data into Splunk can be challenging, especially when dealing with syslog, one of the most crucial data sources. Syslog can present several hard-to-solve problems, such as high volume, non-compliant messages, and the use of the unreliable UDP network protocol. One Identity’s syslog-ng Premium Edition (PE) and syslog-ng Store Box (SSB) can help manage these challenges effectively.
Apple Innovates, Securaze Sustains: Supporting Progress and Sustainability in the MacBook Ecosystem
Apple has once again captivated tech enthusiasts with its latest announcement: the introduction of the new 13 and 15-inch MacBook Air models featuring the formidable M3 chip. This unveiling marks a significant leap forward in Apple’s lineup, promising enhanced performance and efficiency for users worldwide.
3 steps for API monetization
API monetization can significantly drive business growth by curating and monetizing your APIs in a marketplace designed to simplify and enhance API adoption.
RISING USB-BORNE CYBERATTACKS RAISE CONCERNS
Portable USB storage drives offer users a convenient means to transfer data between work and home, as well as among computers within an organization. This has proven especially valuable during the COVID-19 pandemic, which mandated remote or hybrid work setups. However, this convenience has introduced significant security challenges.
How to tap into the full power of open banking APIs
In the last decade, numerous banks have established developer portals to release their open APIs. Developers can visit these portals, register, and leverage the bank’s APIs for their business initiatives.
About Us
From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.
Contact Us
Address
#02-72 WCEGA Tower,
Singapore 658065