MOST INSIDER DATA LEAKS ARE ACCIDENTAL

MOST INSIDER DATA LEAKS ARE ACCIDENTAL

Data breaches have become more common today. More importantly, the most newsworthy data breaches that occur are malicious, whether that is an individual or gang involved with ransomware or a disgruntled employee trying to settle a score.

Crisis averted: A recap of the OpenSSH and XZ/liblzma incident

Crisis averted: A recap of the OpenSSH and XZ/liblzma incident

A novel backdoor (CVE-2024-3094)  was recently discovered from a widely used xz-utils ‘liblzma’ data compression library build system. This backdoor reportedly targets the OpenSSH server but has the potential to target any application that integrates with ‘systemd’, uses ‘OpenSSL’, and can be contacted from the network. Pending detailed analysis of the malicious binary code injected, the full scope and impact of the backdoor are still unknown.

Data replication: What is it and what are the advantages of using it?

Data replication: What is it and what are the advantages of using it?

Data replication has moved from “nice to have” to “mainstream” for use cases such as High Availability and Disaster Recovery. At the same time, companies are discovering the need to replicate or move data for other reasons, including performance and translating transactional data into events.

Getting data to Splunk

Getting data to Splunk

Getting data to Splunk can be challenging. Syslog is still the most important data source, and it can provide you with hard-to-solve problems (for example, like high volume, non-compliant messages, unreliable network protocol (UDP), and more). The syslog-ng Premium Edition (PE) and syslog-ng Store Box (SSB) by One Identity can make these challenges manageable.

3 steps for API monetization

3 steps for API monetization

API monetization can drive significant business growth. It ties back to curating and monetizing your APIs in a marketplace that you build to simplify and increase API adoption.

RISING USB-BORNE CYBERATTACKS RAISE CONCERNS

RISING USB-BORNE CYBERATTACKS RAISE CONCERNS

Portable USB storage drives give users a convenient way to move data between work and home, as well as among computers within an organization. This has been especially true during the COVID-19 pandemic, when stay-at-home protocols forced organizations to shift to remote or hybrid work spaces. That convenience has come at a cost.

Security intelligence analytics: Planning Increases ROI

Security intelligence analytics: Planning Increases ROI

It’s been a week. A long week. After the most recent Board of Directors meeting, your senior leadership tasked you with finding a security analytics solution. Over the last month, you’ve worked with leadership to develop some basic use cases to determine which solution meets your security and budget needs.

About Us

From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.

Contact Us

Address

21 Bukit Batok Crescent,
#02-72 WCEGA Tower,
Singapore 658065

Phone

+65 6266 2877