All News

Check Point Software Technologies (Images by Acclaim)

Wednesday, August 12 2020 - 13:45 IWST

Check Point’s 2020 Cloud Security Report Highlights Enterprise Security Concerns and Challenges in Public Clouds

The report shows that public cloud security continues to be a major challenge: 75% of respondents stated they were ‘very concerned’ or ‘extremely concerned’ about it.

Ilustration Brand phishing (Photo by Technonlogy For You)

Tuesday, August 04 2020 - 09:15 IWST

Google and Amazon Overtake Apple as Most Imitated Brands for Phishing in Q2 2020

Brand phishing involves the attacker imitating an official website of a known brand by using a similar domain or URL, and usually a web page similar to the original website.

Meet Hacker (Photo by HackerOne)

Wednesday, July 29 2020 - 14:30 IWST

Meet Hacker @jin0ne: A Next Generation Cyber Defender

Asia continues to be a growing international hub for talented hackers who want to do good. Last year, hackers around the world earned over US$40 million in bounties on the HackerOne platform,…

HIMA (Photo by Rail Solutions Asia 2019 - German Pavilion)

Wednesday, July 29 2020 - 12:40 IWST

Top 5 Questions on How To Keep Your Plant Running Safely During Times of Crisis

Safe distancing, circuit breaker, lockdowns, working from home (WFH) - the never ending of changes we are facing during these unusual times of the COVID-19 pandemic raises new challenges for…

Ilustration Smart City (Photo by aceHTrend.com)

Tuesday, July 21 2020 - 11:10 IWST

Future City - The Virtual Smart City Hackathon, Jakarta And Berlin Are Tackling Covid-19 Challenges With Support Of The European Union

akarta Provincial Government and the State Government of Berlin are jointly implementing the project 'Smart Change - Strengthening Urban Governance, Prosperity and Innovation in Jakarta', funded…

Check Point Software Technologies (Images by Acclaim)

Wednesday, July 15 2020 - 14:35 IWST

SIGRed – This is Not Just Another Vulnerability- Patch Now to Stop The Next Cyber Pandemic

Now imagine that a hacker could do the same on your organisation’s network, intercepting and manipulating users’ emails and network traffic, making services unavailable, harvesting users’…

Shandra Gemmiti - Marketing Manager, at Synopsys Software Integrity Group

Wednesday, July 15 2020 - 11:00 IWST

Open Source Audits: The Secret Ingredient for Successful M&A

Organisations are also keenly aware of the legal risks of failing to comply with the open source licenses that govern the components they use. Consequently, open source security and license…

HIMA (Photo by Rail Solutions Asia 2019 - German Pavilion)

Tuesday, July 14 2020 - 09:35 IWST

HIMA Recognized by Frost & Sullivan for its Industry-leading Industrial Process Safety Systems in the 2020 Asia-Pacific Best Practices Awards

HIMA Paul Hildebrandt GmbH, world's leading independent provider of smart safety solutions for industrial applications, has been recognized at the prestigious Frost & Sullivan 2020 Asia-Pacific…

Check Point Software Technologies (Images by Acclaim)

Wednesday, July 08 2020 - 16:50 IWST

Check Point Infinity SOC Eliminates Alert Overload, Enabling Security Teams to Identify and Block Cyber-Attacks

Check Point Software Technologies Ltd (NASDAQ: CHKP), a leading provider of cybersecurity solutions globally, has announced the launch of Infinity SOC, which unifies threat prevention, detection,…

An Open Source Audit Digs Into a Codebase to See What’s Inside

Tuesday, July 07 2020 - 07:00 IWST

Know your code—and know your stuff!

Open source in a codebase typically results from the collective decisions of individual developers. A developer faced with a gap in functionality might cast about the internet for a “puzzle…

Körber

Saturday, July 04 2020 - 20:30 IWST

Körber Unveils Next-Generation Sorter for Supply Chain Automation

Körber, the global supply chain technology leader from software to materials handling automation, today unveils the Körber Crossbelt Sorter. The latest addition to Körber’s portfolio empowers…

Ilustration Cyber Security (Photo by Cyber Security—Advancing through AI - IEEE Innovation at Work)

Wednesday, July 01 2020 - 10:35 IWST

As Organisations Get Back to Business, Cyber Criminals Look for New Angles to Exploit

As businesses re-open, Covid-19 continues to pose a threat so organisations are implemented testing programs and enforcing new workplace rules to prevent new infections. To prepare employees…

HackerOne (Images by Tekno Tempo.co)

Friday, June 26 2020 - 16:45 IWST

Innovation by Community: Misconceptions and How to Integrate it to Your Work Processes

Innovation is a change that creates a new dimension of performance. In March of 2020, HackerOne was ranked by Fast Company as the 5th most innovative company in the whole world for putting hackers…

Check Point Software Technologies (Images by Acclaim)

Wednesday, June 24 2020 - 14:20 IWST

Check Point Partners with Coursera to Deliver Free Online Courses, Helping Cyber-Security Professionals Develop Their Skills

Check Point Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cybersecurity solutions globally, has today announced a new partnership with Coursera, a world-leading online learning…

Check Point Software Technologies (Images by Acclaim)

Thursday, June 18 2020 - 15:00 IWST

Check Point Software’s New Rugged Gateway Secures Industrial Control Systems and Critical Infrastructures Against The Most Advanced Cyber-Threats

Check Point Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cybersecurity solutions globally, has announced the new 1570R rugged security gateway to protect networks in critical…

Ilustration Security Challenges (Photo by Information Age)

Saturday, June 13 2020 - 13:00 IWST

How to Overcome The Top 6 Application Security Challenges

When security becomes a problem, it becomes a crisis. Getting ahead of the crisis potential with a proactive security approach allows you to reclaim your staff and reinvest your time and activities…

Ilustration Cyber Security (Photo by Cyber Security—Advancing through AI - IEEE Innovation at Work)

Friday, June 12 2020 - 12:10 IWST

Cutting Complexity to Strengthen Security: Why Consolidation Matters

New survey of more than 400 security professionals globally shows non-integrated, point solutions make enterprise security more challenging

HackerOne (Images by Tekno Tempo.co)

Friday, June 12 2020 - 11:30 IWST

Government Technology Agency of Singapore Concludes Third HackerOne Bug Bounty Programme, Enhancing Cybersecurity Defences

Hackers discovered a total of 33 valid security vulnerabilities and earned US$30,800 in bounties, financial incentives awarded for submitting valid security vulnerabilities, making this the…

more