<
>

The Five Essential Elements of Next-Gen Endpoint Protection

For the past few weeks, we have been exploring and investigating modern-day cyber threats. It has brought back memories of reading about the sleuthing chronicles of Baker Street in London. Traversing the anatomy of fileless...

Everything you need to know about boosting your business with the right PSA

By Nop Srinara, Director, Datto Asia It’s no secret that one of the greatest challenges to growing a professional service business is the increasingly long list of things that need to happen in order to keep things...

The Anatomy of Fileless Intrusions

The characterisation of stealth by Sun Tzu in “Art of War”  could almost have been a blueprint for fileless intrusion. As cyber attackers seem to shift their tactics, using fileless attacks to evade detection one...

Chatting with Infoblox’s Executives at Cloud Expo Singapore 2018

DSA was an official media partner at the recent Cloud Expo Asia event that took place at the Marina Bay Sands in Singapore. The event is becoming one of the largest technology events in the region and the number of vendors on...

Storing European Data? Better Be Ready For GDPR

We are now living in the post-digital era where it’s almost impossible for an individual not to leave digital footprints through their daily transactions and interactions. Businesses, meanwhile, are collecting more data...

Stopping Hidden Threats: How to Defend Against Fileless Attacks

Just like tsunamis wreaking havoc in certain parts of the world, fileless attacks are creating similar damages in the cybersecurity scene. Fileless attacks are basically set of tactics that are deployed to intrude the system...

What are some examples of Unified IT?

Attributed to McKay Allen, Director of Global Marketing, Ivanti Ivanti has talked a lot lately about their vision for Unifying IT, about breaking down siloes and improving IT departments at companies across the world....

Backup Pain Solved - NetApp E-Series Flash with Veeam Hyper-Availability

Ask any IT professional where their greatest source of pain is and it would be a safe bet that backup and recovery operations is near the top of the list.   If you have ever heard yourself or colleague say things...

What is Data Virtualisation and Why Does It Matter to Your Business?

Big Data Analytics and Business Intelligence Systems no longer just answer questions and provide deep insights to business. They are the key component in enabling new business models, achieving competitive advantage, developing...

How Machine Learning Works in Cyber Security

Almost every vendor in the tech space is claiming that their offering is powered by artificial intelligence or machine learning. These are buzzwords that marketing departments feel the need to include to make their offerings...