White Paper: How to configure syslog-ng™ PE to cooperate with Splunk

White Paper: How to configure syslog-ng™ PE to cooperate with Splunk

Splunk is a popular search and analysis platform. Many users of Splunk also have syslog-ng™ deployed in their environments. This guideline describes scenarios in which Splunk users can benefit from syslog-ng™ Premium Edition features and offers some technical guidance to optimize the syslog-ng™ configuration.

SSH in the World of Post-Quantum Cryptography (PQC)

SSH in the World of Post-Quantum Cryptography (PQC)

Nowadays, advances in quantum computing are moving at a neck-breaking pace. Giants in the field have been faithfully executing roadmaps and delivering on milestones laid out several years ago. And while it is hard to predict when the advances will reach their breaking point, the threat to classical, public key cryptography is getting closer.  

Understanding attack paths targeting Active Directory

Understanding attack paths targeting Active Directory

Attack paths are at the forefront of cybersecurity discussions today. But exactly what is an attack path? Why is Active Directory (AD) particularly vulnerable? And what can you do to protect your organization? This blog post covers all these questions and more.

Syslog-ng 101, part 5: Sources

Syslog-ng 101, part 5: Sources

This is the fifth part of my syslog-ng tutorial. Last time we had an overview of the syslog-ng configuration and had our first steps working with syslog-ng. Today we learn about syslog-ng source definitions and how to check the syslog-ng version and its enabled features.

SSH launches new version of Tectia to provide Quantum-Safe communications for US federal government

SSH launches new version of Tectia to provide Quantum-Safe communications for US federal government

Helsinki, Finland – March 16, 2023 –  The US federal government has shown significant interest in Quantum-Safe communications during 2022, most evidently through Quantum Cybersecurity Preparedness Act, which mandates all electronic communications to be Quantum-Safe after a transition period. The federal government acts as a transformation leader that is followed by other actors in the public sector and even private enterprises.

Let’s Discuss Data Sanitization: Misconceptions, Misinformation, Reality.

Let’s Discuss Data Sanitization: Misconceptions, Misinformation, Reality.

In the digital age, concerns about data management and privacy are ever-increasing as the volume of data is increasing exponentially. As regulatory compliance and concerns about data privacy grow, it is the job of the IT industry to ensure data security, preventing leakage, through proper implementation of data sanitization procedures and tools.

YubiHSM 2, the world’s smallest hardware security module, enhanced with new features to support security for the Public Sector

YubiHSM 2, the world’s smallest hardware security module, enhanced with new features to support security for the Public Sector

Compliance mandates require many of our customers in regulated industries or in high-risk environments to prove adequate levels of protection for their data, no matter where it lives or travels. This is why we’ve continued to enhance the capabilities of both the YubiHSM 2 and YubiHSM 2 FIPS, the world’s smallest FIPS-validated and non-FIPS hardware security modules (HSMs). Today, we’re also excited to share that the YubiHSM 2 FIPS now meets FIPS 140-2, Level 3. Jump ahead to the “what’s new” section below to learn about the key new features in our YubiHSM 2 products.

10 Microsoft service account best practices

10 Microsoft service account best practices

Microsoft service accounts are a critical part of any Windows ecosystem because they are used to run essential services and applications, from web servers to mail transport agents to databases. But all too often, they are not used and managed properly — which leaves the organization at unnecessary risk of business disruptions, security breaches and compliance failures. Indeed, problems with service accounts are one of the top four issues that we at Quest uncover during security assessments.

Steps to expedite the privileged access management implementation process

Steps to expedite the privileged access management implementation process

Every organization can draw a line from their entire operation to privileged accounts and systems. Within every system a company uses, there’s a privileged account behind it to access everything from employee emails to sensitive databases and personally identifiable information (PII) data. No matter what risk you point at in an organization, you can draw a threat vector from that risk to a privileged account. With 70 percent of breaches linked to privilege abuse, organizations need a streamlined approach to protecting identities and privileged access. Because these accounts pose an elevated risk, it’s key to get them under control as soon as possible. Speed is key. There are significant benefits to accelerating the privileged access management (PAM) implementation process.

How Transportation and Logistics Firms use Secure File Transfer

How Transportation and Logistics Firms use Secure File Transfer

With DHL being one of the most spoofed domains, the logistics and transportation industry is turning more to secure file transfer. The shipping titan struggles with just one of the diverse security challenges the industry faces. Unfortunately, many of those risks are passed on to consumers, lessening industry credibility and creating unnecessary risk just when interconnectedness is at its peak and the demand for dependable goods transport is at its highest. Now, more than ever, shipping companies need to be on their game.

Expanded Security Key Series now available: Phishing-resistant, FIDO-only MFA for enterprises and individuals

Expanded Security Key Series now available: Phishing-resistant, FIDO-only MFA for enterprises and individuals

Last month, we announced the expansion of both Yubico’s YubiEnterprise Subscription and our Security Key Series lineup, which included the addition of two new enterprise, FIDO-only (FIDO2/WebAuthn and FIDO U2F) keys. We’re excited to share that the Security Key Series are officially available today and can be purchased via our expanded YubiEnterprise Subscription program for enterprises or directly on Yubico.com for consumers.

About Us

From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.

Contact Us

Address

21 Bukit Batok Crescent,
#02-72 WCEGA Tower,
Singapore 658065

Phone

+65 6266 2877