All News

Sharat Sinha - Vice President/ GM, APAC at Check Point Software Technologies (Photo by CRN India)

Tuesday, December 15 2020 - 14:15 IWST

The ‘New Normal’ is Here to Stay for Some Time: New Survey Reveals Organisations’ Security Priorities for 2021 and Beyond

This was highlighted in a new survey that we conducted to learn what organisations’ main security challenges and priorities are for the next two years, and the changes to their security strategies…

Tim Mackey, Principal Security Strategist, Synopsys Cybersecurity Research Centre (CyRC) (Photo by Synopsys)

Monday, December 14 2020 - 12:40 IWST

The Security Dilemma of IoT Devices and Potential Consequences

The cybersecurity issues that we all live with today and that can be fixed with an app update or something that’s being pushed out may not necessarily be a priority within the executive teams…

Taylor Armerding, Software Security Expert at Synopsys Software Integrity Group (Photo by Linkedin)

Thursday, December 10 2020 - 10:20 IWST

Configure Security Tools for Effective DevSecOps

Cycle (SDLC) there will be bugs and other defects that create security vulnerabilities that hackers can exploit. Addressing those vulnerabilities effectively is called defect management.

Daniel J. Blanchett is an English and Emotional Intelligence lecturer at President University in Cikarang and is currently pursuing a Masters in Management Technology

Tuesday, December 01 2020 - 06:00 IWST

Leveraging Business Opportunities through the Push-Pull-Moring Model in a COVID-19 World

Utilizing the Push, Pull, Mooring model (PPM) businesses can identify and take advantage of customer dissatisfaction in the marketplace by competitors.

Oleg Mogilevsky - Product Marketing Manager at Check Point Software Technologies (Photo by Linkedin)

Tuesday, November 10 2020 - 11:00 IWST

Five Reasons to Reevaluate Your Endpoint Protection

With the new emerging threats caused by remote working standards, security professionals need to reevaluate their approach to protecting endpoints. In order to do so, it’s vital that organisations…

Darrell Adams, Head of Southeast Asia & Oceania, Universal Robots (Photo by LinkedIn)

Tuesday, November 10 2020 - 10:30 IWST

Collaborative Robots Open New Horizons in Quality Control Processes

Collaborative robots (cobots) offer suitable solutions to manufacturers. Hence, cobot-based quality control and inspection systems that can transition between different end products in very…

Adi Ikan - Network Research & Protection Group Manager, at Check Point Software Technologies (Photo by Linkedin)

Friday, October 30 2020 - 10:05 IWST

Measuring the Global Impact of the NSA’s Top 25 Vulnerabilities Being Exploited In the Wild

NSA’s list of top vulnerabilities were used to launch 3 million attacks in 2020, with 2.5 million of those attacks occurring in the last 6 months.

Ian Hall - Asia-Pacific Client Services Manager, at Synopsys Software Integrity Group

Monday, October 26 2020 - 11:00 IWST

4 Steps for CISOs to Improve Their Organisation’s Application Security Program

Synopsys recently published its annual BSIMM report, created to help organisations plan, execute, measure, and improve their software security initiatives

Friedhelm Best - Vice President Asia Pacific, HIMA (Photo by HIMA)

Friday, October 23 2020 - 14:30 IWST

Farm & Food 4.0: How Technology Is Transforming an Industry

Digitization has affected different industries, and especially now, the food and farming industries as well.

Rena Chua, Bug Bounty Advisor at HackerOne (Photo by Linkedin)

Friday, October 23 2020 - 11:35 IWST

3 Key Problems Security Professionals Have With Traditional Penetration Testing

Based on customer interviews, the study identifies 3 key problems with traditional pentesting solutions and evaluates the benefits of time-bound testing using ethical hackers.

Yaffa Finkelstein - Product Marketing Manager, Check Point Software Technologies (Photo by Linkedin)

Thursday, October 22 2020 - 10:35 IWST

Secure Your Containers Like Your Apps Depend On It

Today we’ll share some of the container security concerns which you might not have considered until now, and we’ll explain how to mitigate those risks, without imposing on your agile DevOps…

Friedhelm Best - Vice President Asia Pacific, HIMA (Photo by HIMA)

Wednesday, October 21 2020 - 14:20 IWST

Pharma 4.0: How Technology Is Transforming an Industry

Digital advancements in areas like systems integration, track-and-trace technology, and deep learning are helping the industry optimize its supply chain, improve safety, and even develop new…

Evan Dumas, Regional Director, Southeast Asia, Check Point Software Technologies (Photo by Linkedin)

Wednesday, October 21 2020 - 13:50 IWST

Key Pillars To Optimal Endpoint Security In Today’s Climate

What does it take for businesses to be confident in the resilience of their endpoint protection? Check Point shares 4 key pillars for optimal endpoint security solutions for CISOs and IT professionals…

Evan Dumas, Regional Director, Southeast Asia, Check Point Software Technologies (Photo by Linkedin)

Friday, October 16 2020 - 17:00 IWST

3 Key Principles Businesses Must Keep In Mind When Securing the Remote Workforce

It is critical that organisations take steps to secure the remote workforce to prevent falling victim to the next cyber attack.

Tim Mackey, Principal Security Strategist, Synopsys Cybersecurity Research Centre (CyRC) (Photo by Synopsys)

Thursday, October 15 2020 - 19:05 IWST

Common Questions When Establishing an Organisational Culture of DevSecOps

Organisations are introducing security earlier in the software development life cycle (SDLC) by expanding close collaboration between development and operations teams in the DevOps movement…

Evan Dumas, Regional Director, Southeast Asia, Check Point Software Technologies (Photo by Linkedin)

Wednesday, October 14 2020 - 21:45 IWST

Securing the Remote Workforce in the New Normal — 5 New Cyberthreat Trends to Look Out For

Check Point Research have observed 5 new trends in cyberthreats that were triggered by the outbreak of the coronavirus.

Patrick Carey, Director, Product Marketing, Synopsys Software Integrity Group (Photo by LinkedIn)

Wednesday, October 07 2020 - 16:15 IWST

Under Pressure: Managing The Competing Demands of Development Velocity and Application Security

Meaning, don’t worry about performance optimisations until your code actually does what it’s supposed to do, and don’t worry about code maintainability until after you know it both works…

Dr Paul Gardner-Stephen, Senior Lecturer, College of Science and Engineering, Flinders University (Photo by ICT Days)

Thursday, September 24 2020 - 15:15 IWST

NBN Co to Spend $3bn Upgrading Half of FTTN Network to Full Fibre

In particular, the original Fibre-To-The-Premises (FTTP) plan had several key advantages that this announcement is not able to solve.

more