Unified threat managment (UTM) security vendor WatchGuard has grown in Asia riding the UTM wave and its CEO tells Edwin Yapp why more is expected out of this security segment in the years to come.
The corporate world has perhaps experienced more changes in the last five years than it has the preceding two decades, due to factors ranging from global economic upheavals to disruptive technologies.
The long-held belief that it is better for IT security vulnerabilities to be kept under wraps and not shared between organisations and the security community is flawed, as such a practice could be detrimental to the industry as a whole, according to Facebook’s security head.
Visa Inc has announced a series of enhancements to its Advanced Authorization technology that significantly improves the ability of its global processing network to detect potential electronic payments fraud.
The HackWEEKDAY hackathon is a 24-hour, non-stop coding marathon that runs throughout both HITB conference days, writes Maverick. This year's event promises to be even bigger and better.
If we could put a man on the moon during the height of the hippie generation, why is it so hard to secure our computing environments?
Great Eastern Life Assurance has turned to Symantec Corp in a bid to streamline its operations, improve its IT systems and ensure that it has the technology capabilities to serve its customers in a more holistic manner.
VADS Berhad has launched two new web security products: Managed Unified Threat Management (MUTM) and Managed Web Application Firewall (MWAF), which it said are part of its Managed Security Services portfolio that is based on a ‘defence in depth’ strategy for today’s highly-networked environment.
Data breaches – security incidents where user information becomes publically exposed or stolen – are a serious issue for an organization. The exposure of customer data can lead to a loss of confidence in the organization by its users, said Symantec.
As you round out your 2013 business and IT plans, cybercriminals are resolving to implement increasingly sophisticated threats targeting specific computer systems and organizations big and small. Check Point Software Technologies Ltd’s Rajlingam Sokalingam tells us what to expect.