Share this page:

Resource Centre

Industry News

Google sets up cybercrime-busting task force

Google has set up an internal task force that will work to expose the activities and techniques of malicious Internet wrongdoers, aiming to cut down on the number of targeted cyberattacks. “You should be able to use the Web without fear that a criminal or state-sponsored actor is exploiting software bugs to infect your computer, steal secrets or monitor your communications,” wrote Chris Evans, a Google security researcher, in a blog post Tuesday announcing the initiative, called Project Zero.

Read More

Cybercrime is growing problem in New York

More than seven million New Yorkers had their personal records hacked in 2013 alone. Now, State Attorney General Eric Schneiderman is hoping awareness and safety tips can stop the growing problem. A new report from the AG’s office said more than 22 million personal records in New York were hacked over the last eight years. John Porter said he was one of the victims.

Read More

ICS-CERT: U.S. Public Utility Hacked

Reuters reports that the U.S. Department of Homeland Security (DHS) has acknowledged that an unidentified public utility in the U.S. was recently compromised by a sophisticated hacker group. In a report [PDF], DHS' Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) explained that the software used to mange the utility's control system was accessible via the Internet.

Read More

Cloud Storage Startup Tresorit Raises $3M To Put Security Spotlight On Dropbox, Box And Others

Amidst the on-going revelations about the NSA and its PRISM Internet surveillance program and the more recent ‘heartbleed‘ bug, it’s no surprise to see startups turn their attention to security and, in some cases, position themselves as a more secure player compared to others in the market.

Read More

Europe's cybersecurity policy settings under attack

Even as Europe powered up its most ambitious ever cybersecurity exercise this month, doubts were being raised over whether the continent's patchwork of online police was right for the job. The exercise, called Cyber Europe 2014, is the largest and most complex ever enacted, involving 200 organisations and 400 cybersecurity professionals from both the European Union and beyond.​

Read More

CTIA releases report “Mobile Cybersecurity and the Internet of Things”

The CTIA-The Wireless Association, a Washington, D.C. based trade association for wireless providers, has released a new report entitled, “Mobile Cybersecurity and the Internet of Things: Empowering M2M Communication” through their Cybersecurity Working Group (CSWG). The report takes a look at the “Internet of Things” (IoT), everyday items from home appliances to cars that are interconnected, and some of the security challenges related to them.

Read More

Pages

Frost & Sullivan Reports

  • Cybersecurity
  • Border Management
  • Safe Cities
  • Supply Change Security
1. Increasing Complexity of Cyber Threats Compels Business of All Sizes to Deploy Content Security Solutions
Download
2. Data Loss Protection a Priority among Asia-Pacific Enterprises as Cyber Threats Become Complex, Finds Frost & Sullivan
Download
1. Russian Security Market: Developing Local Partnerships is Paramount to Success
Download
2. International Co-operation on Travel Security Fuels Global Border Control and Biometrics Market
Download
1. Government Emerges As the Biggest Spender on Biometrics in the SEA and ANZ Markets
Download
2. Mass Transport Operators Reinforce Security as Threats and Insurance Claims Grow
Download
1. Innovations in Information and Communication Technologies Assist Rise of Collaborative Supply Chains
Download
2. Frost & Sullivan Lauds Airclic Mobilized Electronic Proof of Delivery Solution for Real-Time Visibility in Supply Chain
Download

*Note: To download more than 1 report under each domain at one go, please click on the report images you are keen before you submit the below form.

Upon completion of the below form, you will be able to download the report and will also be subscribed to the mailing list to receive more updates of the event.
Type the characters you see in this picture. (verify using audio)
Type the characters you see in the picture above; if you can't read them, submit the form and a new image will be generated. Not case sensitive.

Event Owner

Supported By

Supporting Knowledge Partner

Held in

Managed By