The digital world is constantly evolving, and so are the hackers who inhabit it. As technology advances, so do the methods and tools used by those with malicious intent. Currently, about 30,000 websites are hacked each day.
One of the most popular applications to feed Splunk with syslog messages is syslog-ng. However not everyone is happy to work on the command line anymore. This is where syslog-ng store box (SSB), an appliance built around syslog-ng, can help
“When you move your business to the cloud, it is important to ensure your information security. Information security management is based on trust, and it is a good idea to remember the old saying ‘Don’t put all your eggs in one basket’,” says Miikka Sainio
When we look at Zero Trust, it helps to take a step back. The internet is flooded with articles, hot takes, and it’s all too easy to get caught up in the hype. We run the risk of going too fast and missing important fundamentals
In 2021 the FBI’s Internet Crime Complaint Center (IC3) fielded a record 847,376 reported complaints – a 7 percent increase from 2020. Potential losses exceeded $6.9 billion.
At the time of writing, much of Europe and the U.S. is in the midst of a major heatwave, delivering record temperatures and concerns about climate change. Just as the heat is rising, so is the threat of cyberattacks.
To protect against modern cyberthreats, Yubico offers the YubiKey, a hardware security key for phishing-resistant two-factor (2FA), multi-factor (MFA), and passwordless authentication at scale. Organizations worldwide are deploying YubiKeys to ensure secure user access to business networks, data, applications, and to reduce operating costs
Versasec’s award-winning software, vSEC:CMS, has empowered organizations around the world to adopt multi-factor authentication, certificate-based authentication, and reach a Zero Trust Architecture. Versasec’s customers remain on top of the latest cybersecurity technologies and best practices for identity management.
Fireworks lighting up the sky, the smell of backyard grills cranking out delicious food, and organizations reeling from massive global cyberattacks. Aaah….those not-so-sweet memories of that first weekend in July 2021, when hundreds of businesses were smacked with the financial, logistical, and reputational ramifications of ransomware attacks.
Balázs Scheidler, founder of the syslog-ng project, describes the latest syslog-ng release: “syslog-ng 3.37 has just been released, packages available in various platforms this week. You can get the detailed release notes on the github releases page, however I felt this would be a good opportunity to revisit my draft on the syslog-ng long term objectives and how this release builds in that direction.”
Embracing the “new normal”, the Ministry of Information and Communications together with the Authority of Information Security (MIC) and IEC Group will be hosting the Vietnam Security Summit in Hanoi within a safe and inspiring environment on 23rd June 2022 at the JW Marriott Hotel Hanoi.
Founded in 1998, White Canyon Software created a drive deleting tools called CleanDrive, which would later change into WipeDrive. Since then, White Canyon Software has been well-known
From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.
#02-72 WCEGA Tower,