Modern Listing Example
How will Australia keep up
The UK’s National Crime Agency (NCA) has recently published its Cyber Crime Assessment 20161, highlighting…
Shadow IT and BYOD—Conquering These Corporate Cousins
By Almi Dumi, Sr. IT Security Engineer / Team Lead, {e}Mazzanti Technologies Keeping Up with…
CSX Cyber Challenge to be Held at ISACA’s Global CSX Conferences
Cybersecurity Competition Coming to Las Vegas, London and Singapore Competitive games can drive innovation, improve…
IoT and Cloud Innovation Awards 2016
IT gurus, VCs and professionals from the world’s leading technology press and analysts will select…
SecureWorks Research Indicates Top Ransomware Families Making Their Way Through APAC Region
At least 0.25% to 3.0% of victims pay ransom to attackers holding data hostage SecureWorks…
Trend Micro detects more than 1 million ransomware threats in Australia throughout 1H 2016
1H security roundup report showcases evolution of ransomware and BEC scams As Trend Micro predicted,…
MALAYSIA: Security and Risk Environment
Understanding the Security spectrum of Malaysia, it’s worthwhile to run through a bit of the…
The safe city and it’s need for interoperability
Most people today who live in cities, particularly large ones, have become accustomed to a…
