The perception is that certain industries need a data destruction policy far more than others. Of course institutions like banks and hospitals need to enforce data destruction, as they handle vast amounts of confidential data. At first glance, a business like a restaurant does not even compare. However, as every business is examined, one constant becomes clear: data. All companies – regardless of size or industry – house data.
Securaze Mobile & Common Criteria
Securaze is the ONLY one worldwide to have achieved Common Criteria certification for our Mobile Erasure (Android and iOS)!
Top seven reasons your API developer portal is failing
API portals should be giving app developers the tools they need to find APIs and you the tools to manage the entire API lifecycle. They’re supposed to make your APIs easier to adopt. And they were supposed to be helping you get a return on your API investments.
Your Security Awareness Program Can Do More Than You Think: Fulfilling the Promise of “Training for All”
In the world of security awareness training, we like to think of ourselves as providing training for each employee in the building. There was a time when training non-cyber staff on cyber threats was a novel idea. But, as it became apparent that end users were increasingly becoming one of, if not the single largest, attack vector for cyber threat actors, the field of Security Awareness entered the mainstream.
Syslog-ng 101, part 12: Elasticsearch (and Opensearch, Zinc, Humio, etc.)
This is the 12th part of my syslog-ng tutorial. Last time, we learned about enriching log messages using syslog-ng. Today, we learn about how to send log messages to Elasticsearch.
THE IMPORTANCE OF LOG MONITORING IN ANOMALOUS BEHAVIOR ANALYTICS
Anomalous behavior analytics is one of the many advantages that big data analytics brings to the table. What role does log monitoring have in this process, and how does it work together with behavioral analytics?
9 ways to speed up your Microsoft 365 migration
Microsoft 365 migrations can be complex. With so many vital business applications in use—like Teams, OneDrive, SharePoint and Outlook along with the sheer volume of data stored on each of these—there is a lot that can go wrong.
New technology and the refurbished electronics market
While the tech world was looking forward to the upcoming release of the iPhone 15 in September, an exciting development is taking place in the market which could have a major impact on those consumers who are seeking almost-current smartphones at lower prices. The trend is the market opening up for recycling, remanufacturing and bringing back to the market used iPhone models 13 and 14.
Phishing – It’s No Longer About Malware (or Even Email)
Phishing has been and continues to be one of the most common methods (TTPs) cyber attackers use because it is so effective. Phishing is a simple attack vector that enables cyber attackers to easily scale their attacks, customize for their intended targets, and bypass many security controls. Reports like the Verizon DBIR or the Microsoft Digital Defense continue to identify phishing as a top risk. While technologies like email filtering (example Proofpoint) and EDR (example Crowdstrike) make it much more difficult to succeed, cyber attackers have continued to adapt.
NEXT-LEVEL THREAT HUNTING: SHIFT YOUR SIEM FROM REACTIVE TO PROACTIVE
Threat hunting is proactively identifying and thwarting unusual network activity that could indicate an attempted security breach. It’s a historically manual activity, making it time-intensive and arduous. It’s no wonder, then, why most organizations don’t have the time, budget, or resources to undertake it effectively…if at all. That’s why many organizations rely on “reactive” threat response solutions, including firewalls, intrusion detection, and SIEM to alert analysts to an event after it occurs. Without the resources to commit to proactive threat hunting, reactive solutions are the next best option.
7 tenant-to-tenant migration planning tips
Tenant-to-tenant migrations are increasingly common. Some are necessitated by business changes like mergers, acquisitions, and divestitures, while others are driven by the desire to clean up or consolidate the IT infrastructure to facilitate business processes and reduce administrative overhead.
Getting data to Splunk
Getting data to Splunk can be challenging. Syslog is still the most important data source, and it can provide you with hard-to-solve problems (for example, like high volume, non-compliant messages, unreliable network protocol (UDP), and more). The syslog-ng Premium Edition (PE) and syslog-ng Store Box (SSB) by One Identity can make these challenges manageable.
About Us
From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.
Contact Us
Address
#02-72 WCEGA Tower,
Singapore 658065