Category: Cybersecurity
60 Secs Tech Views: Data Protection On-The-Go
Our world’s slimmest Storage Encryptor Mobile, has clinched both theCES Innovation Award 2019 and the Singapore Good Design Award 2019 for outstanding design. In this 60s video series with Li Danlin, Manager of Crypto Products, uncover the story of our Storage Encryptor Mobile. Watch the video below for the full content.
60 Secs Tech Views: En Route To An Effective Security Operation Centre
Organisations are constantly facing issues to fill in cybersecurity expertise for people, processes and technologies to stay ahead of cyber-attacks. The inability has compounded their challenge in maintaining an effective Security Operations Centre (SOC). It is critical to keep up with the ever-changing cyber landscape and an effective SOC is designed with an open platform…
Cryptography – The Unsung Hero For Safe Digital Access, Transactions And Operations
In this thought leadership piece by Chia Boon Quee, Chief Cryptography Officer, Cybersecurity, ST Engineering, we will uncover the world of cryptography. In his course of over 20 years in information security, he has led the technical team on network security products, served as a lead security architect and technical lead for many classified projects…
Securing Critical Information Infrastructures And Systems
At one of Asia’s largest real estate groups, estate managers had the onerous task of managing multiple properties across a global portfolio of commercial buildings, industrial parks and residential estates. Even with the help of building management systems (BMS) to handle everything from access controls and elevators to heating, ventilation and air conditioning systems, overseeing…
Bios Shield Use Cases Infographics
Endpoints are the weakest link in the security chain. According to a recent report, more than 70%1 of breaches originate at the endpoint and 42%1 of endpoints are unprotected at any given time. With a dispersed workforce out of office, endpoint security has become an urgent necessity for organisations. A full understanding of your enterprise is crucial…
6 Essential Steps To Secure Your Data
In today’s digital age, cyber threats are not only on the rise but also evolving at a rapid pace. Data security is extremely vital for any organisation, irrespective of its size. A breach in data can easily lead to a loss in business continuity, trust, profits and more. In the infographics below, we have listed…
Securing Data On The Go With The Award-Winning Storage Encryptor Mobile
Encrypted solid state drive (SSD) with Two-Factor Authentication. Do not be a victim of loss of data breach on the go. Each year companies lose huge amounts of unsecured data to lost or stolen USB flash drives, including financial information, business plans and client information. Some data leaks have ruined deals and reputations. With the increase…
Safeguarding Cyber Landscapes With Industry’s First Security Operations Centre As-A-Platform Solution
Meet Tan Wei Peng, Division Manager, Solution Presales and SOC Product Division, who is also the Chief Solution Architect of the SOCaaP. Since joining ST Engineering four years ago, Wei Peng has been deeply involved in the conceptualisation and development of cybersecurity operations centres (SOCs). He shares that it was through deep understanding of customers’…
A Business Imperative – What We Must Do Today To Secure Critical Infrastructures
It is not a question of IF but WHEN. In 2017, Wannacry ransomware affected more than 230,000 computers in 150 countries, causing damage to key organisations such as UK NHS, European Telecoms companies and Germany state railways. Since then, there have been many others like the NotPetya, Bad Rabbit and Triton just to name a…