Security

Sponsored Post: Setting up a BYOD beach-head in your enterprise
The corporate world has perhaps experienced more changes in the last five years than it has the preceding two decades, due to factors ranging from global economic upheavals to disruptive technologies.
Security weaknesses must be shared openly: Facebook CSO
The long-held belief that it is better for IT security vulnerabilities to be kept under wraps and not shared between organisations and the security community is flawed, as such a practice could be detrimental to the industry as a whole, according to Facebook’s security head.
Visa beefs up card fraud detection capabilities
Visa Inc has announced a series of enhancements to its Advanced Authorization technology that significantly improves the ability of its global processing network to detect potential electronic payments fraud.
Bigger, better HackWEEKDAY at this year’s HITBSecConf
The HackWEEKDAY hackathon is a 24-hour, non-stop coding marathon that runs throughout both HITB conference days, writes Maverick. This year's event promises to be even bigger and better.
21st Century Risk Management Part 1: Managing risk means taking risks
If we could put a man on the moon during the height of the hippie generation, why is it so hard to secure our computing environments?
Great Eastern Life, Symantec in security suite deal
Great Eastern Life Assurance has turned to Symantec Corp in a bid to streamline its operations, improve its IT systems and ensure that it has the technology capabilities to serve its customers in a more holistic manner.
VADS unveils managed security products for businesses large and small
VADS Berhad has launched two new web security products: Managed Unified Threat Management (MUTM) and Managed Web Application Firewall (MWAF), which it said are part of its Managed Security Services portfolio that is based on a ‘defence in depth’ strategy for today’s highly-networked environment.
Spammers working through the holidays: Symantec
Data breaches – security incidents where user information becomes publically exposed or stolen – are a serious issue for an organization. The exposure of customer data can lead to a loss of confidence in the organization by its users, said Symantec.
Security threats: What to expect in 2013
As you round out your 2013 business and IT plans, cybercriminals are resolving to implement increasingly sophisticated threats targeting specific computer systems and organizations big and small. Check Point Software Technologies Ltd’s Rajlingam Sokalingam tells us what to expect.
BYOD still has some way to go
BYOD has been the buzzword this year in the enterprise world. Some enterprises, especially MNCs, have developed policies to embrace the trend, but the support is not there, says one survey by Ovum. The road to further adoption could still be far off, argues Edwin Yapp.
Subscribe to SNAP
Download Digerati50 2018-2019 PDF

Digerati50 2018-2019

Get and download a digital copy of Digerati50 2018-2019