HelpSystems Is Now Fortra!

HelpSystems Is Now Fortra!

Say hello to Fortra, the new face of HelpSystems. The realm of cybersecurity is always changing, and we’re evolving right alongside it. As a Fortra partner, we’re committed to bringing you the same incredible products and people-first support you’ve come to expect from HelpSystems and DT Asia

The syslog-ng Insider: June 2022 Newsletter

The syslog-ng Insider: June 2022 Newsletter

Balázs Scheidler, founder of the syslog-ng project, describes the latest syslog-ng release: “syslog-ng 3.37 has just been released, packages available in various platforms this week. You can get the detailed release notes on the github releases page, however I felt this would be a good opportunity to revisit my draft on the syslog-ng long term objectives and how this release builds in that direction.”

A Yubico FAQ about passkeys

A Yubico FAQ about passkeys

Passkeys are like passwords, but better. They’re better because they aren’t created insecurely by humans, and because they use public key cryptography to create much more secure experiences. But passkeys aren’t a new thing. It’s just a new name starting to be used for WebAuthn/FIDO2 credentials that enable fully passwordless experiences.

Expert Views on How to Properly Implement Cyber Security Measures

Expert Views on How to Properly Implement Cyber Security Measures

Current technology advancement not only brings people to get ‘closer’ and borderless in digital world, but it also causes increasing cyber threats to organizations and companies, as well as individual users. Cybercriminals continues to step up their games by using even more sophisticated tools and social engineering techniques that will lure people to fall into their trap.

A Glimpse into The Future of Modern Authentication

A Glimpse into The Future of Modern Authentication

The IT industry quickly adapted this methodology and OTP became widely used in many organizations and companies. Different OTP standards were developed, which eventually led to OAuth, a standard to standardize types of OTP. This period also saw the emergence of 2FA (Two Factors Authentication) and MFA (Multi Factors Authentication)

Tectia Quantum – Ready For The Near Future

Tectia Quantum – Ready For The Near Future

Quantum computers exist right now: They are in the cloud where anyone can access at a reasonably low cost. The overall increase in cybercrime and the financial capabilities of cybercriminals (currently over 1 trillion p.a. estimated to grow to 10 trillion p.a. by 2025): Especially ransomware attacks.

syslog-ng: An Indispensable ‘Ninja’ Tool for Cybersecurity

syslog-ng: An Indispensable ‘Ninja’ Tool for Cybersecurity

In today’s fast changing world of cybersecurity technologies, log management is boring. In the 1980s, syslog started as part of the Sendmail project, where log messages can be used for security analysis, system/operational management, debugging and compliance.

When Sharing Is Not Always Caring

When Sharing Is Not Always Caring

There are many things that have changed during the pandemic. New habits are being adopted and people are beginning to embrace the changes. Businesses no longer work the way they used to. Many workplaces now prefer flexible workspaces with shared workstations to reduce office rent cost and encourage hybrid working.

Securing Your Data Is Simple with SecureDrive

Securing Your Data Is Simple with SecureDrive

With remote and hybrid working becoming the new norm in organizations, many employees choose to use portable storage devices for their ability to transport data easily and quickly. Portable storage devices such as external hard drives and USBs are also very handy for backing up important documents

Protecting Your Most Privileged Users Through YubiKey

Protecting Your Most Privileged Users Through YubiKey

Company’s information is increasingly considered as key corporate assets. Customers’ information, financial data, important documents and product blueprints are examples of important and sensitive data that must be guarded from unauthorized access to maintain information security

About Us

From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.

Contact Us

Address

21 Bukit Batok Crescent,
#02-72 WCEGA Tower,
Singapore 658065

Phone

+65 6266 2877