ANNOUNCES PARTNERSHIP WITH DT ASIA TO ADDRESS GROWING DEMAND FOR THREAT DETECTION & INCIDENT RESPONSE SOLUTIONS
In April this year, Decree No. 13/2023/ND-CP – the first Vietnam data protection law – was issued, providing guidelines on personal data protection in the country. The Decree shall become effective from July 1st, 2023. Foreign investors should take note of these regulations.
“…In Singapore, 65% of employees rely on username and password as a primary means of authentication – far exceeding the already-concerning global average of 59%…”
Say hello to Fortra, the new face of HelpSystems. The realm of cybersecurity is always changing, and we’re evolving right alongside it. As a Fortra partner, we’re committed to bringing you the same incredible products and people-first support you’ve come to expect from HelpSystems and DT Asia
Balázs Scheidler, founder of the syslog-ng project, describes the latest syslog-ng release: “syslog-ng 3.37 has just been released, packages available in various platforms this week. You can get the detailed release notes on the github releases page, however I felt this would be a good opportunity to revisit my draft on the syslog-ng long term objectives and how this release builds in that direction.”
SSH Communications Security announces the release of Tectia version 6.6, The Quantum-Safe Edition. Tectia Quantum-Safe Edition tackles new rising cyber threats and ensures future-proof data security. A related Edition, Tectia Zero Trust, was already implemented in Tectia version 6.5 in March 2022.
Passkeys are like passwords, but better. They’re better because they aren’t created insecurely by humans, and because they use public key cryptography to create much more secure experiences. But passkeys aren’t a new thing. It’s just a new name starting to be used for WebAuthn/FIDO2 credentials that enable fully passwordless experiences.
Current technology advancement not only brings people to get ‘closer’ and borderless in digital world, but it also causes increasing cyber threats to organizations and companies, as well as individual users. Cybercriminals continues to step up their games by using even more sophisticated tools and social engineering techniques that will lure people to fall into their trap.
The IT industry quickly adapted this methodology and OTP became widely used in many organizations and companies. Different OTP standards were developed, which eventually led to OAuth, a standard to standardize types of OTP. This period also saw the emergence of 2FA (Two Factors Authentication) and MFA (Multi Factors Authentication)
SSH launches Tectia Quantum-Safe and Zero-Trust Editions for the Next Wave of Secure Application Communications
SSH announces two new editions of their flagship product Tectia SSH Client/Server: Tectia Quantum-Safe Edition and Tectia Zero Trust Edition. These new additions to the Tectia product family will ensure that SSH’s secure remote access solutions stay agile, dynamic and robust
Quantum computers exist right now: They are in the cloud where anyone can access at a reasonably low cost. The overall increase in cybercrime and the financial capabilities of cybercriminals (currently over 1 trillion p.a. estimated to grow to 10 trillion p.a. by 2025): Especially ransomware attacks.
In today’s fast changing world of cybersecurity technologies, log management is boring. In the 1980s, syslog started as part of the Sendmail project, where log messages can be used for security analysis, system/operational management, debugging and compliance.
From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.
#02-72 WCEGA Tower,