Technology
Palo Alto Networks’ 6 cybersecurity predictions for Asia Pacific in 2016
1. Ransomware Ransomware will continue to evolve its methods of propagation, evasion techniques and continue…
MIF Regulation: have you paid attention to article 10?
Requirement for Visual and electronic identification of the card type Commonly known as the “MIF…
New PCI DSS Guidance From ISACA Helps Organisations Navigate Compliance Challenges
Implementing the demanding security requirements of the Payment Card Industry Data Security Standard (PCI DSS)…
Why suppliers could be the weakest link in your cyber security strategy
Cyber attackers are increasingly using their target organisation’s supply chain as a route to attack…
Ashley Madison App Rebounding to Pre-Hack Highs – AVG Q3 App Report
Latest AVG Android App Performance & Trends Report finds surge in dating apps usage and…
Akamai Releases Q3 2015 State of the Internet – Security Report
Akamai mitigated a record 1,510 DDoS attacks, a 180% increase over Q3 a year ago;…
F5 Networks announces availability of Web Fraud Protection solutions to meet growing security needs of customers in Asia Pacific
WebSafe and MobileSafe secure financial and e-commerce apps and mobile apps against sophisticated fraudulent threats…
HOLIDAY HAZARD: Shopping Apps Highlight the Risk of Mixing Personal Apps and Business Data
With the holiday season fast approaching, people are seeking refuge in online shopping and mobile…
North American Underground: The Glass Tank
Compared to other underground communities in other regions, the cybercriminal underground in North America isn’t…
Seven security trends to watch in 2016
1. Jewels in the Cloud; Thieves in the Cloud The keys to the kingdom are…
Australian Consumers Embrace Digital Engagement But Say Security and Data Privacy Are Critical
Australians are enthusiastic supporters of digital engagement, with seven out of ten consumers acknowledging digital…
Hybrid IT: helping Australian multinationals overcome IT challenges
Many multinational organisations face significant IT challenges due the distributed nature of the organisation, and…
Check Point Launches Top Predicted Security Threats for 2016
At the beginning of last year, Check Point’s top predicted security threats for 2015 included…
Yamaha Motor revs up security and speed with Verizon
Yamaha Motor has chosen Verizon to support two of its critical Information Technology programmes for…