
Commentary
In-depth analysis of tech topics
-

Comments by: Lotem Finkelstein, Director, Threat Intelligence and Research for Check Point Software Technologies I cannot overstate the seriousness of this threat. On the face of it, this is aimed at crypto miners but we believe this creates just the sort of background noise that serious threat actors will try to exploit in order to…
-

By: Jeffrey Kok, Vice President Solution Engineers for Asia Pacific and Japan at CyberArk. Given all the accounts all of us maintain in the digital world, good password hygiene is a security measure that individuals and organisations alike must practice to defend against cyber threats. However, despite knowing the importance of unique passwords, we are…
-

By: Sarah Tatsis, SVP, BlackBerry IVY Platform Development The future of automotive transportation will be defined by two domains: the driving function and the in-car user experience. 2022 will see: The Rise of Killer App(s) – A series of applications that support and complement each other emerge over the next couple of years and it…
-

But like all programming languages, Python is not immune to security threats. Secure coding best practices must be adopted to avoid risks from attackers. In this article, we’ll explore Python security best practices that should employed when building secure application.
-

By: Gil Vega, Chief Information Security Officer at Veeam Software Since computers have existed, so have those who want to exploit them. Let’s take a look at how you can secure the computers that you rely on. By computers we don’t just mean laptops and PCs; don’t forget your mobile devices, tablets, routers, smart speakers, smart TVs (maybe even your smart fridge!). Every device has the potential to be…
-

By: Gary Gardiner, Head of Security Engineering, APAC & Japan, Check Point Software Technologies Cyberattacks linked to pandemic-related developments worldwide continued to impact organisations in 2021. Cybercriminals doubled down on their attacks, taking advantage of countries experiencing new COVID-19 strain waves or entering various stages of reopening their borders, with spikes in fake vaccine certificate…
-

By Chris Connell, Managing Director for Asia Pacific at Kaspersky Smart home technologies have long ceased to be something new or surprising. Today, the idea of smart home appliances or switches isn’t from a cyberpunk scene, but rather an actively emerging reality. For example, the report from Berg Insight revealed that the number of smart…
-

By: Song Toh, Vice President, Global Network Services, Tata Communications Networks form the central nervous system of any modern enterprise, and as such, are assessed by how smoothly and seamlessly they can transfer data to the right people in the right places. For the last few years, the state of things was that if you were…
-

By: Hwee Yng Yeo, Industry Solutions Manager, Automotive and Energy, Keysight Technologies Earlier this year, Tesla announced it will start selling the Tesla Model 3 in Singapore. This is probably welcome news for electric vehicle (EV) afficionados in this tiny island country, which is famous for its chili crabs and infamous* cost of car ownership. Tesla’s…
-

By: Chrystal Taylor, Head Geek™, SolarWinds Over the past year, many workers have transitioned into work-from-home (WFH) arrangements. This is no different for government officials and public sector workers here in the Asia-Pacific region. In Singapore, public servants have taken on a hybrid arrangement, with three days in the office and two at home. The question…

You must be logged in to post a comment.