Feature Stories

The great submarine leak
The wide-ranging data leak on India’s French-origin Scorpene submarines hosted on its website recently by…

Combating financial fraud: How to save billions with a text
Fighting fraud is an ever escalating arms race, with criminals working to exploit the next…

Singapore Cyber Updates
Highlights from the Singapore International Cyber Week 2016 (10th Oct 2016 – 12th Oct 2016,…

IT executives take pause as technology vendors queue up outside your door
The global political stage is certainly an interesting spectacle for the rest of us to…

Canalys Channels Forum – Interview with Peter Ryan
STEVE BRAZIER INTERVIEWS PETER RYAN, CHIEF SALES OFFICER, ENTERPRISE GROUP, HEWLETT PACKARD ENTERPRISE Peter Ryan…

Executive Editor AISA National Conference 2016 Interview Series: Bruce Schneier
Cybersecurity Guru Bruce Schneier, author of ‘Data & Goliath’, a New York Times bestseller,…

Fighting technology with technology: protecting children from cyber bullies
Technology has altered the way we live. This goes for both positive interactions with technology,…

The non-IT expert’s guide to surviving a cyberattack
Cyber-crime is one of the fastest growing industries in the world. In the last year,…

The safe city and it’s need for interoperability
Most people today who live in cities, particularly large ones, have become accustomed to a…

Prevention is still better than cure
There is still a defeatist attitude resonating through the industry when it comes to security…

Security industry must embrace modern technologies
The global security industry is growing at a rapid pace. More professional and coordinated operations…

ISACA’s CSX Hosts Free Virtual Conference: “Cybersecurity Evolves”
The digital world is on a constant continuum of evolution and expansion. To keep pace,…

Instagram accounts hacked, altered to promote adult dating spam
Norton by Symantec has found that scammers are hacking Instagram accounts and altering profiles with…

Increased Cyber Threat Activity in Brazil
Global Cybersecurity Threat Report Provides Research on Advanced Threat Techniques and Data on Cyber Threats…