......
Goal: simplify the user process during encryption in the Cloud and on mobile devices Stormshield, a major European player in the cybersecurity market, is continuing to develop its data protection solution for mobile devices and the Cloud with the new Stormshield Data Security for Cloud & Mobility version 1.2. Stormshield Data Security for Cloud &...
Stormshield, a key European player in the cybersecurity market, is launching Stormshield Visibility Center (SVC), its supervision solution for security events across the entire suite of Stormshield products. SVC is for any company, regardless of its size. This product offers administrators a turnkey solution that provides comprehensive, unified visibility of the security of their information systems...
Date : 08 Nov 2016
As Peter Scholtes once said: "In a world without data, opinion prevails." In IT, as is the case elsewhere, this may become a dangerous adage. Especially when it comes to comparing products with characteristics that can be measured in some way, for which benchmarks may vary radically when they are ill adapted. Take the antivirus for...
The latest release of DenyAll's Next Generation WAF marks a new milestone in the platform merge journey of the application security vendor. Version 6.2 embeds several innovations: new learning capabilities to automate HTTP and REST API security, the core security engines of DenyAll rWeb, a high-level orchestration API and advanced reporting capabilities. DenyAll announces the general availability of version 6.2...
Date : 31 Oct 2016
For Industrial Control Systems, often described as Supervisory Control and Data Acquisition (SCADA), availability and safety are the two top priorities. However, security has now become a major issue and therefore must not be ignored. Security of Industrial Control Systems: an issue linked to...
Date : 25 Sep 2016
The number of security breaches attributed to third parties continues to rise - the IRS was hit by a wave of attacks last year and let's not forget the infamous Target breach of 2013 that saw 40 million debit and credit card details leaked - yet a PwC Global State of Information Security Survey found that 74% of companies do not even have a complete inventory of all third...
Date : 21 Sep 2016
Unknown hackers have used NSA hacking tools released online last month to breach some targets using firewalls, switches and routers made by Cisco Systems, according to the tech company. This is apparently the first real-world cyberattack leveraging an unknown vulnerability that was in the arsenal of the NSA elite hacking team for years until a mysterious group calling itself The...
This package is available with all Stormshield Network Security products, guaranteeing that sensitive environments have an optimal, certified level of security from end to end, helping to protect highly confidential data. Stormshield, a leader in the European cybersecurity market, is launching Trusted VPN, a package that provides sensitive environments with guaranteed, highly secure protection for data flows and information stored...
Date : 19 Sep 2016
Pokemon Go App from Official Google Play and Apple store is safe (despite recent rumors) BUT... Pradeo has detected malware in the wake of Pokemon GO phenomenal sucess. Here are some related Apps and description of some of their unwanted behaviors. Enjoy the game but don't trust fake copies! Pokemon G0 version : 0.29.0 Sends user phone number, sms content, call log info, browser history...
Date : 14 Sep 2016
Two researchers from Pen Test Partners turned the heat up a notch in the computer security industry by taking a smart thermostat hostage during the DEFCON conference on August 6. Exploiting a bug in this smart object running on Linux, they took control remotely via the thermostat's Internet and prompted the victim to install a third-party app that covertly installs...
Date : 14 Sep 2016
With an ever evolving regulatory landscape and with increasingly smart technology at our fingertips, it's probably time we paused to examine the way we're doing business. Just because it's been done a certain way for years, it doesn't mean that's still the right way. Businesses need to start seeing the bigger picture rather than forever playing catch-up, as so many...
Date : 14 Sep 2016
Most of our customers use Microsoft applications such as Sharepoint, OWA (Outlook Web Access), Exchange, Lync, etc. Unfortunately, this ecosystem often relies on propriatery protocols like RPC that require special attention. Besides, administrators may wish to enhance authentication requirements, typically with SSO (Single Signo-On) or Kerberos integration. Specially, in the context of Microsoft TMG's EOL, administrators should look for an adequate replacement technology...
Date : 13 Sep 2016
Bizsecure APAC had been featured on Cambodia Sabay News as well! As foreseen in the future there will be a huge increase of cyber attacks, cyber crime on going. FirstCambodia had initiated to partner with Bizsecure APAC , a leading professional cyber security provider Singapore company, has been known as one of the exclusive representative for French cyber security solutions...
Date : 08 Sep 2016
Welcome to the new BizSecure APAC website. Our new site provides a more customer-focused experience to provide you with solutions that will help secure your assets. Check back on the site frequently as we will be continually adding more content, features, and updates. The site has been completely redesigned to simplify and improve navigation, and it features a responsive design to allow for...