Cyber Security Tech News

Arm Neoverse: The modern cloud to edge infrastructure foundation for a world of a trillion intelligent devices

Arm, Singapore – October 31, 2018 – Arm today disclosed details on a dedicated roadmap and new brand of infrastructure-class IP for 5G networks and next-generation cloud to edge infrastructure.  Arm® Neoverse® solutions are uniquely designed for higher-levels of performance, security, and scalability not seen today. Innovation from microarchitecture design up through silicon, software, and systems […]

Cyber Security Tech News

AMD and Oracle Collaborate to Provide AMD EPYC™ Processor-Based Offering in the Cloud

Today at Oracle OpenWorld 2018, AMD (NASDAQ: AMD) announced the availability of the first AMD EPYCTM processor-based instance on Oracle Cloud Infrastructure. With this announcement, Oracle becomes the largest public cloud provider to have a Bare Metal version on AMD EPYCTM processors. The AMD EPYC processor-based “E” series will lead with the bare metal, Standard […]

Cyber Security Tech News

For the Second Consecutive Year, Synopsys Survey Shows Web and Mobile Applications Are Top Security Challenges for IT Professionals in Asia

SINGAPORE, October 16, 2018 – Synopsys, Inc. (Nasdaq: SNPS) today announced the results of its 2018 survey of 251 IT professionals revealing that customer-facing web applications continue to present the highest security risk to businesses in Asia Pacific (36 percent of the respondents), followed by internal-facing web applications (26 percent) and mobile applications (25 percent). […]

Cyber Security Tech News

MCAFEE ACCELERATES AND IMPROVES BOTH DATA PROTECTION AND THREAT PREVENTION ACROSS DEVICE TO CLOUD

INDONESIA, October 19, 2018 – McAfee, the device to cloud cybersecurity company, announced new products expanding its McAfee MVISION portfolio, a first-of-its-kind solution that allows customers to deploy security on their terms as they move to the cloud. Joining McAfee MVISION ePO, McAfee MVISION Endpoint and McAfee MVISION Mobile, announced last July, the newly announced […]

Cyber Security Tech News

Former GIC and Grab Executive Joins Horangi Cyber Security as Chairman to Harness AI in Cyber Security

Horangi Cyber Security announced today that Kevin Lee has joined the company as Executive Chairman. In his new role, Kevin will work on deepening Horangi’s cybersecurity capabilities by harnessing AI and machine learning to enhance the Horangi platform and build out a world-class executive team. He has been serving on the Horangi Board of Directors […]

Cyber Security

CYBER SECURITY | New malware can survive even on reinstalled OS, wiped-out HDD/SSD

Slovak based IT security company, ESET, has recently confirmed the existence of a dangerous malware, dubbed LoJax, that infects a targeted computer by re-writing the Unified Extensible Firmware Interface (UEFI) which is located in the motherboard’s flash memory, allowing it to survive even when you wipe/replace your hard disk and re-install your operating system. UEFI […]

Cyber Security Tech News

ManageEngine Strengthens Endpoint Security with the Launch of Browser Security Plus

Manila, Philippines — Sept. 19, 2018 — ManageEngine, the real-time IT management company, today announced its launch of Browser Security Plus, a browser management solution that helps organizations secure their corporate data in the cloud and protect their networks from web-based cyberattacks. Available immediately, Browser Security Plus provides organizations with a layer of management capabilities […]

Cyber Security

Cybersecurity in APAC: The art of simplicity and being on the right side of history

We all have “a-ha” moments when that lightbulb above our heads is just too bright to ignore. One came to me when I was in a previous IT operations role.  It happened on a day when I had two meetings: first with an endpoint agent team and another with a security operations team. The endpoint […]

Cyber Security

How can blockchain applications adapt and adopt software security best practices?

Though blockchain-native software is in its infancy, the technology races forward to meet more and more use cases. But the community doesn’t seem to have taken software security principles seriously, as we can see from the recent scan of Ethereum smart contracts that identified 34,200 vulnerable contracts (source: https://www.bleepingcomputer.com/news/cryptocurrency/researchers-find-34-200-vulnerable-ethereum-smart-contracts/). For added perspective, a smart contract […]