All News

Rena Chua, Bug Bounty Advisor at HackerOne (Photo by Linkedin)

Friday, October 23 2020 - 11:35 IWST

3 Key Problems Security Professionals Have With Traditional Penetration Testing

Based on customer interviews, the study identifies 3 key problems with traditional pentesting solutions and evaluates the benefits of time-bound testing using ethical hackers.

Yaffa Finkelstein - Product Marketing Manager, Check Point Software Technologies (Photo by Linkedin)

Thursday, October 22 2020 - 10:35 IWST

Secure Your Containers Like Your Apps Depend On It

Today we’ll share some of the container security concerns which you might not have considered until now, and we’ll explain how to mitigate those risks, without imposing on your agile DevOps…

Friedhelm Best - Vice President Asia Pacific, HIMA (Photo by HIMA)

Wednesday, October 21 2020 - 14:20 IWST

Pharma 4.0: How Technology Is Transforming an Industry

Digital advancements in areas like systems integration, track-and-trace technology, and deep learning are helping the industry optimize its supply chain, improve safety, and even develop new…

Evan Dumas, Regional Director, Southeast Asia, Check Point Software Technologies (Photo by Linkedin)

Wednesday, October 21 2020 - 13:50 IWST

Key Pillars To Optimal Endpoint Security In Today’s Climate

What does it take for businesses to be confident in the resilience of their endpoint protection? Check Point shares 4 key pillars for optimal endpoint security solutions for CISOs and IT professionals…

Evan Dumas, Regional Director, Southeast Asia, Check Point Software Technologies (Photo by Linkedin)

Friday, October 16 2020 - 17:00 IWST

3 Key Principles Businesses Must Keep In Mind When Securing the Remote Workforce

It is critical that organisations take steps to secure the remote workforce to prevent falling victim to the next cyber attack.

Tim Mackey, Principal Security Strategist, Synopsys Cybersecurity Research Centre (CyRC) (Photo by Synopsys)

Thursday, October 15 2020 - 19:05 IWST

Common Questions When Establishing an Organisational Culture of DevSecOps

Organisations are introducing security earlier in the software development life cycle (SDLC) by expanding close collaboration between development and operations teams in the DevOps movement…

Evan Dumas, Regional Director, Southeast Asia, Check Point Software Technologies (Photo by Linkedin)

Wednesday, October 14 2020 - 21:45 IWST

Securing the Remote Workforce in the New Normal — 5 New Cyberthreat Trends to Look Out For

Check Point Research have observed 5 new trends in cyberthreats that were triggered by the outbreak of the coronavirus.

Patrick Carey, Director, Product Marketing, Synopsys Software Integrity Group (Photo by LinkedIn)

Wednesday, October 07 2020 - 16:15 IWST

Under Pressure: Managing The Competing Demands of Development Velocity and Application Security

Meaning, don’t worry about performance optimisations until your code actually does what it’s supposed to do, and don’t worry about code maintainability until after you know it both works…

Dr Paul Gardner-Stephen, Senior Lecturer, College of Science and Engineering, Flinders University (Photo by ICT Days)

Thursday, September 24 2020 - 15:15 IWST

NBN Co to Spend $3bn Upgrading Half of FTTN Network to Full Fibre

In particular, the original Fibre-To-The-Premises (FTTP) plan had several key advantages that this announcement is not able to solve.

Rena Chua, Bug Bounty Advisor at HackerOne (Photo by Linkedin)

Thursday, September 24 2020 - 14:15 IWST

How COVID-19 Is Impacting Security

With this accelerated pace of digital transformation, CISOs had to quickly facilitate new needs — while ensuring the security of existing systems and newly-acquired collaboration tools.

Jonathan Knudsen - Senior Security Strategist, Synopsys Software Integrity Group

Wednesday, September 02 2020 - 15:50 IWST

How to Cyber Security: Pain in the AST

Language is tricky, especially in areas where it is evolving quickly. Software security is a young and volatile field where new terminology ebbs and flows continually.

Taylor Armerding, Software Security Expert at Synopsys Software Integrity Group (Photo by Linkedin)

Wednesday, August 12 2020 - 13:15 IWST

Security Bugs and Flaws: Both Bad, But in Different Ways

That should be self-evident. Given that millions of lines of software code are written by thousands of humans all working under pressure, it is inevitable that they would be littered with different…

Rena Chua, Bug Bounty Advisor at HackerOne (Photo by Linkedin)

Thursday, August 06 2020 - 18:15 IWST

Securing More with Less — How to Maximise Security Coverage while Reducing Costs Usings Hacker-Powered Security

Remember those days, pre-pandemic, when you thought your security scope was complex? But now, with employees working from home, new video and collaboration apps being rolled into daily workflows,…

Trisha Paine, Head of Cloud Marketing Programs, at Check Point Software Technologies

Thursday, August 06 2020 - 17:30 IWST

Striving to Achieve High Fidelity Cloud Security

Several attributes make posture management a particularly challenging component of maintaining cloud security. For starters, you cannot secure or scale a rapidly growing quantity and variety…

Luke Tucker, Senior Director of Community at HackerOne (Photo by Linkedin)

Wednesday, August 05 2020 - 22:00 IWST

Security Engineers by Day, Hackers by Night – An Interview with Two of Singapore’s Top Ethical Hackers

Over the years, the perception of the term “hacker” has changed. Once seen as only criminals, there are now over 800,000 registered security professionals on HackerOne, the world’s trusted…

Patrick Carey, Director of Product Marketing, Synopsys (Photo by Linkedin)

Wednesday, August 05 2020 - 21:45 IWST

Developers are Not Security Experts, but They can be with The Right Tools

Software has revolutionised the way in which we work, live and play. This is particularly true in the realm of software security, as development teams are releasing code faster than ever before.

Darrell Adams, Head of Southeast Asia & Oceania, Universal Robots (Photo by LinkedIn)

Wednesday, August 05 2020 - 21:25 IWST

5 Reasons Why You Need Collaborative Automation For Today's World

The benefits of collaborative automation are undisputed – more profitability, productivity, flexibility, higher quality and even more employee satisfaction.

Friedhelm Best - Vice President Asia Pacific, HIMA (Photo by HIMA)

Wednesday, August 05 2020 - 21:10 IWST

3 Essential Considerations When Modernizing the Safety System of Industrial Facilities

As countries in Asia start to ease restrictions and more businesses return to operation in the midst of the COVID-19 pandemic, industrial plant operators are strategising a return to normality…

more