How Transportation and Logistics Firms use Secure File Transfer

How Transportation and Logistics Firms use Secure File Transfer

With DHL being one of the most spoofed domains, the logistics and transportation industry is turning more to secure file transfer. The shipping titan struggles with just one of the diverse security challenges the industry faces. Unfortunately, many of those risks are passed on to consumers, lessening industry credibility and creating unnecessary risk just when interconnectedness is at its peak and the demand for dependable goods transport is at its highest. Now, more than ever, shipping companies need to be on their game.

Expanded Security Key Series now available: Phishing-resistant, FIDO-only MFA for enterprises and individuals

Expanded Security Key Series now available: Phishing-resistant, FIDO-only MFA for enterprises and individuals

Last month, we announced the expansion of both Yubico’s YubiEnterprise Subscription and our Security Key Series lineup, which included the addition of two new enterprise, FIDO-only (FIDO2/WebAuthn and FIDO U2F) keys. We’re excited to share that the Security Key Series are officially available today and can be purchased via our expanded YubiEnterprise Subscription program for enterprises or directly on Yubico.com for consumers.

How Does MFT Help Your Business in the Cloud?

How Does MFT Help Your Business in the Cloud?

An increasing number of people are switching to cloud infrastructure for their businesses, and there are good reasons to do so. As an abundance of companies has already transitioned to the cloud, migrations are increasingly taking place within the cloud, as these organizations migrate between different cloud providers (known as cloud-to-cloud migration). But for those making the initial foray to the cloud, there are a few critical items to consider.

Entering the New Era of Cybersecurity

Entering the New Era of Cybersecurity

Entering the new era of the cybersecurity landscape, it is more important than ever for businesses and organizations to implement robust defensive cybersecurity measures to protect their critical data and communications. The number of cyber-attacks has risen dramatically in recent years, with criminals receiving state-level support. This puts organizations, including government agencies, critical industries and infrastructure, financial institutions, authorities, health institutions, and individual citizens, at great risk.

Automation in Identity and Access Management and what it means for businesses

Automation in Identity and Access Management and what it means for businesses

As organizations are looking to streamline processes and enhance security, pursuing automation in identity and access management is a key area businesses can target. By pursuing automation in identity and access management, IT teams can free up time to work on more important tasks, and reduce the friction required in managing team member and vendor access across necessary accounts, data and applications.

Need to move to a new Office 365 tenant? Let Quest On Demand Migration do the heavy lifting!

Need to move to a new Office 365 tenant? Let Quest On Demand Migration do the heavy lifting!

Today we live in a fast-moving world. Mergers and acquisitions are occurring at a record pace. Impacts of the recent pandemic are only likely to increase this trend. Over the past several years many companies have made the move to Office 365 for their email and collaboration needs. Office 365 is a great solution to streamline collaboration and support work from home initiatives, but what happens when it’s time to move? How will Bill from Research & Development be able to look back at previous collaborative ideas in Teams?

When Should You Start Implementing a Quantum-Safe Solution?

When Should You Start Implementing a Quantum-Safe Solution?

The quantum threat is looming, but we are not exactly sure when it will hit, how serious it will be, or how exactly we should be preparing for it. There is still ongoing development of Quantum-Safe Cryptography, so wouldn’t it be better to wait until Post-Quantum Cryptography (PQC) algorithms are more developed? Let’s find out.

Yubico launches expanded YubiEnterprise Subscription: More choice, faster rollouts and greater peace of mind for enterprises

Yubico launches expanded YubiEnterprise Subscription: More choice, faster rollouts and greater peace of mind for enterprises

We’re excited to announce today’s launch of our expanded YubiEnterprise Subscription program, which aims to offer enterprise customers lower cost and value to entry, flexibility, faster rollout and seamless distribution. As cyberattacks continue to escalate at an alarming rate globally, Yubico strives to offer the most impactful way to up-level enterprise security. By equipping organizations with the gold-standard of phishing-resistant, hardware-based authentication with the YubiKey, companies can better protect themselves, their employees, and their customers against malicious hackers. 

About Us

From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.

Contact Us

Address

21 Bukit Batok Crescent,
#02-72 WCEGA Tower,
Singapore 658065

Phone

+65 6266 2877