5 Things Hackers Love: The Hacker Mindset

5 Things Hackers Love: The Hacker Mindset

The digital world is constantly evolving, and so are the hackers who inhabit it. As technology advances, so do the methods and tools used by those with malicious intent. Currently, about 30,000 websites are hacked each day.

Sending logs from syslog-ng store box to Splunk

Sending logs from syslog-ng store box to Splunk

One of the most popular applications to feed Splunk with syslog messages is syslog-ng. However not everyone is happy to work on the command line anymore. This is where syslog-ng store box (SSB), an appliance built around syslog-ng, can help

7 key considerations for adopting zero trust

7 key considerations for adopting zero trust

When we look at Zero Trust, it helps to take a step back. The internet is flooded with articles, hot takes, and it’s all too easy to get caught up in the hype. We run the risk of going too fast and missing important fundamentals

Accelerate YubiKey adoption at scale

Accelerate YubiKey adoption at scale

To protect against modern cyberthreats, Yubico offers the YubiKey, a hardware security key for phishing-resistant two-factor (2FA), multi-factor (MFA), and passwordless authentication at scale. Organizations worldwide are deploying YubiKeys to ensure secure user access to business networks, data, applications, and to reduce operating costs

Versasec Releases Version 6.4 of Award-Winning vSEC:CMS

Versasec Releases Version 6.4 of Award-Winning vSEC:CMS

Versasec’s award-winning software, vSEC:CMS, has empowered organizations around the world to adopt multi-factor authentication, certificate-based authentication, and reach a Zero Trust Architecture. Versasec’s customers remain on top of the latest cybersecurity technologies and best practices for identity management.

Lessons Learned from the REvil Ransomware Attack of 2021

Lessons Learned from the REvil Ransomware Attack of 2021

Fireworks lighting up the sky, the smell of backyard grills cranking out delicious food, and organizations reeling from massive global cyberattacks. Aaah….those not-so-sweet memories of that first weekend in July 2021, when hundreds of businesses were smacked with the financial, logistical, and reputational ramifications of ransomware attacks.

The syslog-ng Insider: June 2022 Newsletter

The syslog-ng Insider: June 2022 Newsletter

Balázs Scheidler, founder of the syslog-ng project, describes the latest syslog-ng release: “syslog-ng 3.37 has just been released, packages available in various platforms this week. You can get the detailed release notes on the github releases page, however I felt this would be a good opportunity to revisit my draft on the syslog-ng long term objectives and how this release builds in that direction.”

Vietnam Security Summit 2022

Vietnam Security Summit 2022

Embracing the “new normal”, the Ministry of Information and Communications together with the Authority of Information Security (MIC) and IEC Group will be hosting the Vietnam Security Summit in Hanoi within a safe and inspiring environment on 23rd June 2022 at the JW Marriott Hotel Hanoi.

About Us

From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.

Contact Us

Address

21 Bukit Batok Crescent,
#02-72 WCEGA Tower,
Singapore 658065

Phone

+65 6266 2877