<
>

Posts in Cyber Safety

Zoloz, Ant Financial Company is Certified as ISO Compliant for its Biometric Technology

Zoloz, a world-leading electronic Know Your Customer (e-KYC) technology provider and an Ant Financial company, has been certified as Presentation Attack Detection (PAD) Level 1 and Level 2 compliant,...

AEC Deputy-Secretary General: Cybersecurity is Critical in Digital Transformation in ASEAN

ASEAN has to ensure a level playing field to develop a 5G ecosystem for its digital transformation, according to Dr. Aladdin D. Rillo, Deputy Secretary-General for the ASEAN Economic Community (AEC),...

Bring your own privacy: VPNs for consumers and orgs

Attributed to: Malwarebytes Labs   VPNs (virtual private networks) have been popular for quite some time now, and they’re worth a huge amount of money for the companies...

Kaspersky Industrial CyberSecurity Protects Singapore's First Smart Floating Fishing Farm

In order to protect the new S$4 million aquaculture facility’s workstations and servers from cyberthreats, SAT has deployed Kaspersky Industrial CyberSecurity for Nodes. Aquaculture has...

Overcoming Impact of Fake News Attack

The topic of fake news is not new, as it has been discussed and debated extensively in both traditional and alternative media spaces. Broadly speaking, fake news is a campaign of disinformation with...

How remote access and cross office file sharing would help your businesses during difficult times

Authored by: Hewitt Lee, Director of Product Management at Synology Inc   A growing global concern of Coronavirus outbreak has subtly bringing unease upon Asia and devastated global...

McAfee Mobile Threat Report Found 2020 to be the Year of Mobile Sneak Attacks

McAfee released its Mobile Threat Report 2020, and found that hackers are using hidden mobile apps, third-party login and counterfeit gaming videos to target consumers. Hackers targeted...

Embracing the Benefits and Challenges of Digital Transformation

By Gui Alvareng, Product Marketing Manager, Check Point Software Technologies Digital transformation and technology trends have shaped how we live, communicate, and do business. ...

Alyssa Herrera, bug bounty hunter at 16 years old

While most teenagers today are busy playing Fortnite, Instagramming or hanging out at malls with friends, 16-year-old Alyssa Herrera spends her time hunting for bugs. The full-time bug bounty hunter...

ExtraHop Extends Cloud-Native Detection & Response Leadership with Industry’s First Fully Integrated Hosted NDR Solution

ExtraHop, the leader in cloud-native network detection and response, accelerated its market leadership with new capabilities that provide 360-degree threat visibility, detection, and response across...

Pages

Subscribe to RSS - Cyber Safety