Archive for the News Category

Banking Vietnam Event – May 20th, 2014

Banking Vietnam, organized by State Bank of Vietnam, Vietnam Banks Association and IDG Vietnam is the largest and most influential annual banking conference and expo in Vietnam. On behalf of organizers, we are pleased to invite you to participate in Banking Vietnam 2014 on 20-22 May 2014

[read_more text="Read more" title="Read more" url="https://dtasiagroup.com/banking-vietnam-event-may-20th-2014/" align="left"]
[divider_top]

Banking Vietnam Post Event – May 20th, 2014

Speaker Mr. Mike Tan Company DT Asia group Title Founder and Director of DT Asia group Time 20 mins Session 4 Download Download link to be updated after event How Top Government Organizations and Global Technology Companies Fight Advanced Cyber Threats SPEAKER Mr. Mike Tan Mike graduated

[read_more text="Read more" title="Read more" url="https://dtasiagroup.com/banking-vietnam-post-event-may-20th-2014/" align="left"]
[divider_top]

Cyber Intelligence Asia 2014

Singapore, Singapore 11th March 2014 – 14th March 2014 After the successful launch of our Cyber Intelligence conferences and exhibitions our Asia show is moving to Singapore. With many governments in Asia looking to share knowledge and gain a better understanding of how to combat cyber attacks in the

[read_more text="Read more" title="Read more" url="https://dtasiagroup.com/cyber-intelligence-asia-2014/" align="left"]
[divider_top]

SSH Communications Security launches new product

SSH Communications Security whose headquarters is in Helsinki, Finland, launches its new product “CryptoAuditor” in Singapore on 24 September 2012.  The company has more than 3,000 customers worldwide including service providers and financial institutions and Singapore is the first South-east Asian country to launch the company’s “CryptoAuditor”,

[read_more text="Read more" title="Read more" url="https://dtasiagroup.com/ssh-communications-security-launches-new-product/" align="left"]
[divider_top]

Father of SSH working on new version of crypto standard

Network World – The Secure Shell (SSH) cryptographic network protocol that’s supported in software for server authentication and machine-to-machine communications is headed for a significant update. “There will be a new version of SSH,” says Tatu Ylonen, CEO of SSH Communications Security, pointing to the IETF draft document that’s recently been

[read_more text="Read more" title="Read more" url="https://dtasiagroup.com/father-of-ssh-working-on-new-version-of-crypto-standard/" align="left"]
[divider_top]

Save The Date Event: Coverging Threats and Reducing Risks across business units

  The converging world of fraud, internal audit, operational risk and compliance require a unified and robust solution as well as “out of the box” thinking.Learn how the Intellinx holistic approach will help you mitigate fraud and manage risk: protecting your assets, your customers and your reputation.

[read_more text="Read more" title="Read more" url="https://dtasiagroup.com/save-the-date-event-coverging-threats-and-reducing-risks-across-business-units/" align="left"]
[divider_top]

Government Ware Event

  Govware 2013 Date: 1 – 3 Oct 2013 Venue: Suntec Singapore International Convention and Exhibition Centre

[read_more text="Read more" title="Read more" url="https://dtasiagroup.com/government-ware-event/" align="left"]
[divider_top]

Secure Shell key mismanagement poses big risk to your data

Nearly every major network environment today – including governments, large enterprises and financial institutions – uses a version of the Secure Shell data-in-transit protocol, to protect data as it moves throughout the network and allow for administrators to manage systems remotely. Secure Shell works by creating an

[read_more text="Read more" title="Read more" url="https://dtasiagroup.com/secure-shell-key-mismanagement-poses-big-risk-to-your-data/" align="left"]
[divider_top]

Meeting the Revised MAS Technology Risk Management Guidelines

        Dear Partners, Monetary Authority of Singapore (MAS) has released its revised Technology Risk Management (TRM) Guidelines in June 2013. The document presents a set of principles and best practice standards for financial institutions, to establish a sound and robust technology risk management framework,

[read_more text="Read more" title="Read more" url="https://dtasiagroup.com/meeting-the-revised-mas-technology-risk-management-guidelines/" align="left"]
[divider_top]

Nine Questions to Ask When Selecting a Security Vendor

1.Can they thwart bad guys at all phases in the threat lifecycle? Don’t forget that malware and APTs are not the same thing. Your adversaries are engaging in reconnaissance. Then they’re infiltrating your network using malware, stolen passwords, targeted phishing, network vulnerabilities or other methods. Afterward, they’re

[read_more text="Read more" title="Read more" url="https://dtasiagroup.com/nine-questions-to-ask-when-selecting-a-security-vendor/" align="left"]
[divider_top]