<
>

Posts in Threat detection & defence

Datto Announces Global Availability of Automated Third-Party Patching In Datto RMM 6.5

Datto, Inc., the leading provider of IT solutions delivered through Managed Service Providers (MSPs), today announced the global availability of Datto RMM 6.5, which helps MSPs provide reliable...

Security In The Palm of Your Hands – CSA Gets Hands On With Fujitsu Lifebook Equipped with PalmSecure Technology

Biometrics-based authentication systems, a technology which was only found in the realm of science fiction many years ago, are now becoming an integral part of daily life as we look for ways to...

Cybersecurity’s #10yearchallenge

While everyone in social media is all hyped up and hooked onto the #10yearchallenge, we at AOPG decided to have a look at another 10-year challenge, cybersecurity. The IT world was a lot...

How Do Graph Databases Analyse Data?

Analysing security data is critical as it helps organisations have better visibility of their environment. It is important to be able to track and store the interaction of users, machines,...

FireEye Updates Email Security

Editorial Note: With thousands of malicious emails in the web, email security continues to be an important aspect in cyber security.  FireEye, Inc., the intelligence-led security company,...

Retailers to Lose $130bn Globally in Card-not-Present Fraud

A new study from Juniper Research has found that retailers are set to lose some $130 billion in digital CNP (Card-not-Present) fraud between 2018 and 2023. It highlighted that increasingly...

Ransomware: Are Malaysian companies really dealing with it?

Ransomware is a malware, that locks your devices or encrypts your files, and then tells you that you have to pay ransom to get your data back.  It is not cheap and there is no guarantee of...

Threat Graphs: The Old World Statistics Model as a Weapon Against New World Cyber Security Issues

Graph databases are not new. They have been around since the 1960s and work on the basis of storing independent objects and adding dependencies between them. They are not rigid and can adapt as...

How Fast Can Your Computer Security Team Respond to a Threat?

Whenever our systems are compromised, cybersecurity programs are the first to detect the threats. They will then try to fix the problem and send a threat notification to the team of IT technicians....

Staying Resilient In The Face of Agile Cyber Attacks: CSA Interviews McAfee CTO for APAC

In light of the recently released McAfee Labs 2019 Threats Predictions Report, which went in depth into how the threat landscape will look like in the coming year, CSA was able to get in touch with...

Pages

Subscribe to RSS - Threat detection & defence