This post is also available in: Vietnamese
News & Events
How a Remote Workforce Impacts Your Data Security
You did it. Many months ago, you sent your employees home armed with their laptops, a few passwords, and a couple of Zoom invites. Now, hunkered down in their stretchy, comfy clothes, thankful for not having to commute, they’re carrying on the day-to-day business responsibilities for your organization.
Future-Proofing Communications Security – SSH launches Zero Trust Suite
Helsinki, Finland – June 15, 2023 – SSH Communications Security launches SSH Zero Trust Suite, combining SSH’s proven-in-use communications security products into a modern passwordless, keyless, and borderless ecosystem solution and further fortifying solution with quantum-safe capabilities. Borderless means that today cybersecurity threat is equal in internet, extranet, and intranet environments.
Protecting Personal Data: The Importance of Secure Data Erasure
In today’s digital world, our lives are increasingly intertwined with computers and the internet. Whether it’s our personal online activities or sensitive work-related information, the data we share holds immense value…
Syslog-ng 101, part 10: Parsing
This is the tenth part of my syslog-ng tutorial. Last time, we learned about syslog-ng filters. Today, we learn about message parsing using syslog-ng.
You can watch the video or read the text below.
Disaster recovery testing: Why it’s critical and tips to get started
Disaster recovery testing is an IT best practice designed to ensure any organization’s disaster recovery plan actually works across the entire chain of your company’s backup-and-recovery processes. It is a way of verifying that you’re backing up the right data safely and securely. Most importantly, it builds confidence that your data and applications are stored, backed up and can be recovered smoothly and be relied on to maintain business continuity.
How MFT Helps Collaboration in Hybrid Environments
Whether your organization’s employees are back in the office at their desks full time, or more commonly pop into your brick-and-mortar location two to three times a week in hybrid fashion, it’s important to consider how they can securely collaborate. The changing work landscape, with workers spread throughout the world, and schlepping their laptops between home and “the office” requires secure collaboration solutions and managed file transfer (MFT) should be at the top of your hybrid wish list.
The most common cyber resilience frameworks to know
Cyber resilience frameworks can help your organization achieve a vital goal: ensuring you can prepare for, withstand, recover from and evolve to better adapt to cyberattacks and other threats to your IT systems that can disrupt your business, or even bring it to a screeching halt.
Syslog-ng 101, part 9: Filters
This is the ninth part of my syslog-ng tutorial. Last time, we learned about macros and templates. Today, we learn about syslog-ng filters. At the end of the session, we will see a more complex filter and a template function.
SSH launches OpenSSH support service for multi-platform SSH environments
Helsinki, Finland – June 6, 2023 – To resolve various customer support problems regarding OpenSSH implementations, SSH has launched a support service for OpenSSH. As a result, customers benefit from high-quality SSH support services also for the open-source variant of SSH software. OpenSSH will be supported on Windows and Red Hat Linux platforms. The SSH protocol is a secure network protocol used to establish encrypted and secure remote connections and transfer data between different systems.
Vietnam’s Personal Data Protection Decree effective from July: A Quick Guide
In April this year, Decree No. 13/2023/ND-CP – the first Vietnam data protection law – was issued, providing guidelines on personal data protection in the country. The Decree shall become effective from July 1st, 2023. Foreign investors should take note of these regulations.
About Us
From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.
Contact Us
Address
#02-72 WCEGA Tower,
Singapore 658065