Cybersecurity News in Asia

Select Page

Search Results for: Thales

A comprehensive guide to authentication technologies and methods

Processes and technologies for digital identity offer multiple opportunities for impersonation and other attacks.

Digital identity presents a technical challenge because this process often involves proofing individuals over an open network, and always involves the authentication of individual subjects over an open network to access digital services.

Read More

A comprehensive guide to securing data with database encryption

Demand for database encryption is growing – and growing more difficult.

Today’s enterprise security teams are being tasked with supporting a rapid expansion of database encryption use cases.

For today’s businesses, virtually every critical digital business asset ultimately makes it into corporate databases. Not surprisingly, these repositories often represent the most sought-after targets of malicious insiders and cyber attackers — and it’s a database compromise that tends to pose the most devastating strategic and financial penalties to victimized businesses.

Read More

Upgrading existing security systems to become agile quantum-safe

How to ensure critical infrastructure and information are protected against quantum computer attacks.

The threat to public key cryptography from quantum computers is now a matter of “when”, not “if”.

We have only a limited amount of time to upgrade and protect systems that are vulnerable today, to authenticate applications that are sustained through SOTA updates and to transition complex infrastructure to ensure authentication and confidentiality of user identification.

Read More

Voters-draw/RCA-Sponsors

previous arrow
next arrow
Slider

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

Middle-sidebar-banner

Case Studies

Bottom sidebar