<
>

Posts in Cyber Safety

Ivanti Unifies IT, Service Management and Security Operations with Ivanti Automation

Ivanti, the company that unifies IT to better manage and secure the digital workplace, today announced availability of Ivanti Automation. The new product automates tasks and provides integration...

Businesses Collect More Data Than They Can Handle, Reveals Gemalto

Editors Note: CSA found the survey from Gemalto to be rather in-depth and encompassing a number of critical criteria such as “two in three companies (65%) are unable to analyse all the data...

Checkpoint’s New Vortex R6-A Label Enhances Merchandise Visibility While Maintaining Privacy Protection for Retail Shoppers

Checkpoint Systems, a leading global supplier of Electronic Article Surveillance (EAS) and RFID solutions for the retail industry, and Impinj, Inc., a leading provider and pioneer of RAIN RFID...

Tech Mahindra Partners with LIFARS for Digital Forensics & Incident Response Cyber Security Platform

Tech Mahindra, a leading provider of digital transformation, consulting and business re-engineering services and solutions, announced today a strategic partnership with LIFARS, LLC, a cybersecurity...

Safeguarding connected devices in the age of digital transformation

By Goh Chee Hoh, Managing Director, Trend Micro Malaysia   We've all heard about the inevitability of digital transformation. Technologies such as Internet of Things (IoT), big data...

Largest Blockchain Technology Incubator to support the Region in Malaysia

Stephen Chia, Council Member and Regional Head, Southeast Asia, NEM.io Foundation, and Country Lead for NEM Malaysia was on hand at the launching of NEM’s latest Blockchain Centre (NBC), the...

Beware of Malicious Cryptominers Targeting Android Devices

The rapid development, adoption and increased value of cryptocurrency over the recent years have meant that cybercriminals are ramping up efforts to obtain the various types of cryptocurrencies...

Effective Data Management and Resilient Response Key To Thwarting Cyber Threats

As more attention is paid to the issues revolving privacy and breach notification, it becomes increasingly important for people to understand what data they have. Therefore, data mapping, according...

Pick Pocketers Set to Get Lucky With Half of People Not Password Protecting their Mobiles

With half (52%) of people still failing to password-protect their mobile devices, and only 22% using anti-theft solutions, pick pocketers that get their hands on a smartphone could be in for more of...

Executive Strength in Digital Security Leadership

Author: Morey Haber, CTO, BeyondTrust According to TechTarget, Digital Leadership is, “… the strategic use of a company's digital assets to achieve business goals. Digital...

Pages

Subscribe to RSS - Cyber Safety