The HackWEEKDAY hackathon is a 24-hour, non-stop coding marathon that runs throughout both HITB conference days, writes Maverick. This year's event promises to be even bigger and better.
If we could put a man on the moon during the height of the hippie generation, why is it so hard to secure our computing environments?
Great Eastern Life Assurance has turned to Symantec Corp in a bid to streamline its operations, improve its IT systems and ensure that it has the technology capabilities to serve its customers in a more holistic manner.
VADS Berhad has launched two new web security products: Managed Unified Threat Management (MUTM) and Managed Web Application Firewall (MWAF), which it said are part of its Managed Security Services portfolio that is based on a ‘defence in depth’ strategy for today’s highly-networked environment.
Data breaches – security incidents where user information becomes publically exposed or stolen – are a serious issue for an organization. The exposure of customer data can lead to a loss of confidence in the organization by its users, said Symantec.
As you round out your 2013 business and IT plans, cybercriminals are resolving to implement increasingly sophisticated threats targeting specific computer systems and organizations big and small. Check Point Software Technologies Ltd’s Rajlingam Sokalingam tells us what to expect.
BYOD has been the buzzword this year in the enterprise world. Some enterprises, especially MNCs, have developed policies to embrace the trend, but the support is not there, says one survey by Ovum. The road to further adoption could still be far off, argues Edwin Yapp.
For many companies, security is about restricting access to, and putting up walls around, sensitive data and systems. But for vendors in the identity management space, providing the right kind of access to the right kind of information to the right people actually opens up business opportunities.
End-to-end electronic payment solutions and services provider GHL Systems Berhad said it obtained PCI-DSS (Payment Card Industry - Data Security Standards) compliant status on Sept 3.
The virtualization and cloud trends are forcing profound shifts within data centers, affecting everything from IT services and business models to architectures. While the obvious impact of these changes is the need for performance scalability to meet the increasing demands, they also inherently change how data centers are secured. It is this second impact that is often overlooked.