FILTER RESULTS
FILTER RESULTS
close.svg
Search Result for “data protection”

Showing 1 - 10 of 11

OPINION

Drawing the Line on spying on internet chat users

News, Don Sambandaraksa, Published on 23/09/2013

» Thai police claim that the popular instant messaging app Line is secretly helping them to gain access to chat logs. Naver, its creator, has denied helping them and said it had not received any requests from the Thai police. Both statements are very right, and yet are very, very wrong.

TECH

Kaspersky to build up Asean market

Database, Don Sambandaraksa, Published on 22/12/2010

» Kaspersky has announced its plans to take on the lucrative corporate malware protection market here in Asia through sheer technical excellence and promises to do everything, up to and including flying out researchers to investigate problems on-site to help solve the growing problems of targeted attacks that corporations have to face.

TECH

Where will the new world order unfold?

Database, Don Sambandaraksa, Published on 15/12/2010

» When Amazon took down the WikiLeaks site from its EC2 cloud, it opened a whole new can of worms as to what can be put in the cloud and what cannot. But for some, there will be a collective sigh of "I told you so", and the loser in this, again, might well be the United States, while the winner... well, that would be whoever moves quickly enough to take advantage of the upcoming exodus.

TECH

Symantec boosts authentication

Database, Don Sambandaraksa, Published on 17/11/2010

» After 27 years of providing security for end points, Symantec has launched a new logo and acquired a number of companies that together will provide the trust, strong identity and encryption it needs to protect a world where servers are virtualised and are somewhere in the cloud outside of the company's data centre and where CIOs need to be responsible for data that flows readily to their employee's personal smart phones.

TECH

Categorising the world's websites

Database, Don Sambandaraksa, Published on 17/11/2010

» Blue Coat has launched a new traffic-shaping appliance aimed at giving IT departments visibility as to what is personal, what is business and what is the grey area in between, now that everything from games to social networks to corporate enterprise applications are accessed via Internet browsers over the HTTP protocol.

TECH

Seeking unified global approach to cyber crime

Database, Don Sambandaraksa, Published on 20/10/2010

» With cyber terrorism on the increase, the world's law enforcement agencies need to come together to combat the problem.

TECH

Cisco report highlights security woes

Database, Don Sambandaraksa, Published on 01/09/2010

» Cisco has launched its 2010 mid-year security report, which has shown a sea change in how businesses use IT resources with borderless networks, while IT departments struggle to provide security while coping with users using their personal phones to access corporate IT resources and cloud computing, which processes data outside the corporate data centre.

TECH

The case of the missing data privacy law

Database, Don Sambandaraksa, Published on 25/08/2010

» The problem with the computer crime law is not the law itself, but the fact that it was designed as a pair of laws and the thrust of criticism levelled at the law today is really a reflection of the missing data privacy law that was drafted alongside it - the yin to the cyber crime law's yang.

TECH

A new vision for networking

Database, Don Sambandaraksa, Published on 28/07/2010

» The explosion in the demands on data centres means that businesses can no longer continue building out data centres as usual and the industry has reached a critical point where a new network topology will usher in greatly enhanced network performance as well as new opportunities to develop software on the new network fabric, according to Juniper, a leader in the networking space.

TECH

Big Brother is watching - and waiting to break down your doors

Database, Don Sambandaraksa, Published on 24/02/2010

» What do the GT200 magic wand and the Internet Sniffer project have in common? Both are an assault on privacy and allow the state to pick on anyone at will.