Tuesday Mar 19th

The inconvenient truth about cyber fraud
The need to feel safe and secure has its origins at the earliest steps of our development, which makes sense, as we most probably wouldn’t survive otherwise. The same applies for our digital world, where we have to be constantly on alert over potentially falling prey to cyber criminals. With m ...
Read more...
Best practice for DNS attack mitigation
The Domain Name System (DNS) is one of the most important services in IP-based networks and a prime target for hackers. Therefore, you might be interested in the following few useful tips to minimize the risks of DDoS and mitigate damage.
Read more...
ESET Report gets granular on cyber security knowledge, behavior and attitude in Asia
According to the Asia Cyber Savviness Report, released by ESET, 93% of online users in Asia worry about cyber security. In its recent report, the global provider of security solutions highlights that the region still has a long way to go in understanding online security and protecting themselves.
Read more...
Cireson increases security with new Password Reset app
The Microsoft Cloud and System Center expert, Cireson, revealed its new Password Reset app, which is part of the much-anticipated Identity Management Solution for Microsoft System Center Service Manager. The launch comes after the recent unveiling of the Cireson Platform, which combines the very bes ...
Read more...
Hackers look for high damage potential and weak safety precautions
Hacks can paralyze websites or allow data theft, harming the reputation and consequently sales of concerned companies enormously. In the following, we take a look at the procedures of cybercriminals and their goals, as well as defence against the dreaded DDoS attacks.
Read more...
Important IT security factors for compliance requirements
In today’s highly connected world, security and privacy are paramount, and security-conscious organizations depend on solutions to keep their data safe and their information private.Without doubt, the need for protection is growing, with passwords and access restrictions that are unfortunately oft ...
Read more...
Frost & Sullivan identified top performers of the Asia Pacific Web Application Firewall market
The Asia Pacific Web Application Firewall (WAF) market grew 34% in the past two years, reaching a total market size of $155.6 million in 2014, according to the analysts of Frost & Sullivan. The strong growth momentum was driven by the rise in eCommerce and Internet banking activities over the pa ...
Read more...
Closing security gaps is the biggest challenge of the Internet of Things
The consumer electronics giant Samsung just announced that it expects 90% of its devices to be connected to the Internet of Things by 2017, which corresponds with Cisco’s prediction of having 50 billion connected devices by the end of the decade. Quite obviously, the Internet of Things (IoT) is pr ...
Read more...
Digital carelessness is still rampant
Business- and production processes can’t be run without information technology anymore and digital marketing is definitely sitting in the front row here. However, although the risks of cyberattacks can threaten the existence of companies, many still don’t seem to be sufficiently aware of them.
Read more...
Does data protection really loom large these days?
When it comes to privacy laws, they often collide in different countries in the truest sense of the word. There are quite rigid requirements on the one hand and broad, interpretable laws, that allow unrestricted government access, on the other hand. However, to what extend do strict laws protect?
Read more...
Sensitive credentials are the keys to large amounts of critical data, according to hackers
“In today’s cybersecurity arena, the notion of using a traditional perimeter firewall as your primary line of defense is no longer the impenetrable wall it used to be, as hackers and malicious actors consistently find ways to sneak past the first trusted layer of defense”, states Thycotic, a p ...
Read more...
Advanced Persistent Threat (APT)
Advanced Persistent Threats (APTs) exploit the key weaknesses of today’s common IT infrastructures in order to steal intellectual property and sabotage business-critical production environments, explains Imperva, a leading provider of cyber security solutions. The company is specialized in protect ...
Read more...
Stagefright steals information remotely from Android devices
Stagefright, a vulnerability that allows attackers to steal information from Android devices, was discovered just a couple of weeks ago. This flaw allows attackers to steal information from Android devices through remotely executed code via a maliciously crafted multimedia messaging service message ...
Read more...
Bypass luring online dangers
Malicious software, in the form of Trojans and worms, is still the greatest threat on the Internet: Trojans perform dangerous actions unnoticed on affected devices, while worms spread themselves over the Internet and can damage infected computers.
Read more...
Prevent data loss, security and compliance breaches by controlling every file that passes through your mobile devices
Vaultize, a leader in enterprise file security, provides a mobile content management (MCM) platform facilitated through data access rights that allows corporate IT to prevent data loss on their mobile devices. In fact, Vaultize allows granular control over every file that passes through it, includin ...
Read more...
The ultimate web attack survival kit and loads of good advice
We have always to discern between good and evil, right? Well, our digital and technology-driven world is no exception. Here, we have to differentiate between good and evil bots: Some are helpful and facilitate our daily lives; others are not to be trifled with. The bad bots are often machines that a ...
Read more...
Deloitte reveals the top challenges of Chief Information Security Officers (CISOs)
"An effective CISO can no longer rely on his or her technical expertise alone. They must understand how strategic initiatives create risks and develop security programs that balance the need to drive business performance with the growing realities and complexities of protecting customers, intellectu ...
Read more...
Integrated approach to safety issues is crucial for smart city initiatives
With recent reports predicting that the Asia Pacific region will see the largest growth in smart city initiatives over the next 10 years, many have focused on the cost saving benefits and efficiencies that technology can deliver. In fact, a recent report predicted the number of smart cities worldwid ...
Read more...
Acronis provides complete protection both locally and in the cloud
Acronis, a global leader in new generation data protection, just announced the release of Acronis True Image Cloud and Acronis True Image 2016.Powered by the AnyData Engine and set apart by its image technology, Acronis delivers easy, complete and safe file access and sharing, as well as backup and ...
Read more...

About Us

MediaBUZZ is the first ‘pure’ digital publisher in the region, making an impact in Asia Pacific since 2004. Designed to empower marketers in the vibrant, ever-changing electronic marketing environment, its publication Asian eMarketing covers the digital age and zooms in on the most valuable and indispensable tools of today’s marketers. Circulated weekly to more than 60,000 top management and marketing decision-makers, the useful and informative articles support e-marketers in finding a sound marketing strategy, vital for their growing business success.

Contact Us

MediaBUZZ Pte Ltd

Reg. No. 200407301C

Phone: +65 6836 1807

Fax: +65 6235 1706

General Contact: info[at]mediabuzz.com.sg