IT Brief Asia - Technology news for CIOs & IT decision-makers

Device security stories

Story image
Ordr improves security and management of connected devices
Thu 22 Sep 2022
#
ai
#
cloud security
#
malware
It has implemented more than 80 integrations within the Ordr Data Lake while adding security enhancements to accelerate zero trust segmentation.
Story image
Forescout reveals top vulnerabilities impacting OT vendors
Wed 29 Jun 2022
#
iot security
#
forescout technologies
#
security vulnerabilities
Forescout’s Vedere Labs has disclosed OT: ICEFALL, naming 56 vulnerabilities affecting devices from 10 operational technology vendors.
Story image
How rugged devices can support organisations when the cloud goes out
Tue 7 Jun 2022
#
dr
#
climate change
#
connectivity
The risk of businesses’ operational and technological footprints being impacted by extreme weather events continues to grow as climate change increases the frequency of such events.
Story image
As the threat landscape evolves, SASE security models may be the answer
Thu 3 Feb 2022
#
wfh
#
casb
#
sase
"This survey confirmed that organisations have a gap when it comes to users, devices, and access security. To bridge this gap, organisations should progress to a Secure Access Service Edge (SASE) architecture."
Story image
TXOne Networks secures industrial operations with latest release
Fri 28 Jan 2022
#
cybersecurity
#
iot
#
industrial iot
TXOne Networks, a global provider of ICS and industrial IoT (IIoT) security, has launched a new edition of its portable security device.
Story image
The long-tail of COVID-19 and the evolution of ransomware
Tue 21 Dec 2021
#
malware
#
ransomware
#
cybersecurity
The long-tail of COVID-19 means security teams are having to deal with user sprawl and device sprawl, causing big headaches in 2022.
Story image
Samsung outlines cybersecurity strategy for devices
Thu 2 Dec 2021
#
cybersecurity
#
wireless networks
#
samsung
"While we are generally more mindful today of the dangers posed by hackers to our laptops and computers, we also need to recognise that smartphones are prone to cyberattacks as well."
Story image
Trend Micro bolsters security offering with complete device and identity protection
Fri 20 Aug 2021
#
dark web
#
cybersecurity
#
smart home
The solution brings together identity theft and dark web monitoring, WiFi protection, password manager and parental controls.
Story image
Apple jumps on the Bluetooth tracker bandwagon pioneered by Tile
Wed 21 Apr 2021
#
apple
#
technology gifts
#
wireless devices
Apple has entered the market for Bluetooth trackers, pioneered by companies like Tile - but as always, Apple puts its own spin on things.
Story image
E-waste becoming a massive issue for businesses, so what can be done?
Mon 23 Nov 2020
#
microsoft teams
#
blancco
#
report
E-waste is a global concern, and is quickly becoming a crisis of its own, the researchers state. In fact, more than 53 million metric tons of e-waste was produced in 2019.
Story image
Nokia phones lead trust rankings finds Counterpoint research
Mon 2 Nov 2020
#
smartphones
#
technology gifts
#
nokia
Nokia phones are leading the Android ecosystem in providing the fastest software and security updates across the entire portfolio.
Story image
Come 2020, 70% of people will be using smartphones
Fri 5 Jun 2015
#
smartphones
#
technology gifts
#
ericsson
​By 2020, smartphone subscriptions will be more than double, reaching 6.1 billion, and 70% of the world’s population will be using smartphones.
Story image
The mobile enemy
Mon 1 Mar 2010
#
cybersecurity
#
data sharing
#
device security
Internal data theft can be minimised with a good strategy, if you do it right.
Story image
End to end protection
Thu 1 Oct 2009
#
cybersecurity
#
device security
#
check point software
Check Point expert explains why you need endpoint security protection and policies.
Story image
Producing a network security policy
Thu 1 Oct 2009
#
cybersecurity
#
internet
#
device security
Planning a policy is the first step towards good security. Here's how you do it.
© 2022 Techday, All rights reserved. Hosted on Plan B's Cloud Services. DMARC protection by PowerDMARC.