Share this page:

Resource Centre

Industry News

ICS-CERT: U.S. Public Utility Hacked

Reuters reports that the U.S. Department of Homeland Security (DHS) has acknowledged that an unidentified public utility in the U.S. was recently compromised by a sophisticated hacker group. In a report [PDF], DHS' Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) explained that the software used to mange the utility's control system was accessible via the Internet.

Read More

Cloud Storage Startup Tresorit Raises $3M To Put Security Spotlight On Dropbox, Box And Others

Amidst the on-going revelations about the NSA and its PRISM Internet surveillance program and the more recent ‘heartbleed‘ bug, it’s no surprise to see startups turn their attention to security and, in some cases, position themselves as a more secure player compared to others in the market.

Read More

Europe's cybersecurity policy settings under attack

Even as Europe powered up its most ambitious ever cybersecurity exercise this month, doubts were being raised over whether the continent's patchwork of online police was right for the job. The exercise, called Cyber Europe 2014, is the largest and most complex ever enacted, involving 200 organisations and 400 cybersecurity professionals from both the European Union and beyond.​

Read More

CTIA releases report “Mobile Cybersecurity and the Internet of Things”

The CTIA-The Wireless Association, a Washington, D.C. based trade association for wireless providers, has released a new report entitled, “Mobile Cybersecurity and the Internet of Things: Empowering M2M Communication” through their Cybersecurity Working Group (CSWG). The report takes a look at the “Internet of Things” (IoT), everyday items from home appliances to cars that are interconnected, and some of the security challenges related to them.

Read More

NIKSUN: Ensuring Cybersecurity and Optimizing Network Performance

Increasing network complexity, growing obfuscation techniques, and exploding multimedia traffic volumes are bringing a host of next-generation problems from zero-day exploits, targeted malware and Advanced Persistent Threats (APT), to service level disruptions and Payment Card Industry (PCI) compliance issues.

Read More

Eze Castle Integration Tackles SEC Cybersecurity Guidelines for Hedge Funds

While cybersecurity attacks impact every market vertical, one managed services provider (MSP) is narrowing its focus by responding to the security needs of its largest group of customers: hedge fund firms. Eze Castle Integration, an MSPmentor 501 company, has expanded its Information Security Consulting Service to assist customers with satisfying the Securities and Exchange Commission (SEC) cybersecurity guidelines.

Read More

Pages

Frost & Sullivan Reports

  • Cybersecurity
  • Border Management
  • Safe Cities
  • Supply Change Security
1. Increasing Complexity of Cyber Threats Compels Business of All Sizes to Deploy Content Security Solutions
Download
2. Data Loss Protection a Priority among Asia-Pacific Enterprises as Cyber Threats Become Complex, Finds Frost & Sullivan
Download
1. Russian Security Market: Developing Local Partnerships is Paramount to Success
Download
2. International Co-operation on Travel Security Fuels Global Border Control and Biometrics Market
Download
1. Government Emerges As the Biggest Spender on Biometrics in the SEA and ANZ Markets
Download
2. Mass Transport Operators Reinforce Security as Threats and Insurance Claims Grow
Download
1. Innovations in Information and Communication Technologies Assist Rise of Collaborative Supply Chains
Download
2. Frost & Sullivan Lauds Airclic Mobilized Electronic Proof of Delivery Solution for Real-Time Visibility in Supply Chain
Download

*Note: To download more than 1 report under each domain at one go, please click on the report images you are keen before you submit the below form.

Upon completion of the below form, you will be able to download the report and will also be subscribed to the mailing list to receive more updates of the event.
Type the characters you see in this picture. (verify using audio)
Type the characters you see in the picture above; if you can't read them, submit the form and a new image will be generated. Not case sensitive.

Event Owner

Supported By

Supporting Knowledge Partner

Held in

Managed By