This email contains graphics, so if you don’t see them, {readonline}view it in your browser{/readonline}. | |
Connect-World, the information and communication technology (ICT) decision makers’ magazine. We are the decision makers’ forum for ICT driven development. | |
Asia-Pacific I 2014 | 12th March 2014 |
Dear {subtag:name}, As we rely more and more on private and business cyber life, the need for security is taking another dimension. The ‘art’ of generating viruses and Trojans (in particular) is no longer the province of fraudsters and criminals, but dark forces within governments and respectable organisations are now suspected of sponsoring it for political reasons. On one hand, we complain about infringement of our privacy, and on the other hand we protest when government secrets are veiled in secrecy. On one hand we publish personal details on the Internet, and on the other we blame poor security when our identities are stolen and abused. Are we entering the ‘post-privacy’ era where no one can control their privacy any longer? Well, revealing all (to make private information worthless) cannot work when such data is the basis of robbing us of our identities and bank accounts. It certainly does not work for Business, where sensitive commercial online data is now the crown jewels. Therefore, we must soldier on and fight yet another escalated security fight. What makes defending corporate secrets harder is that protecting the enterprise ‘perimeter’ is no longer sufficient. The widely practiced BYOD exposes devices to infection through consumer activities (downloading free apps and dodgy content), which can then spread into private networks, ushering in commercial espionage and advanced DDoS attacks. Recent trends to move data into the Cloud is a mixed blessing. Placing all this precious data in one place is an obvious target for criminals, who can scoop everything in one fell swoop. However, Cloud service providers fortify their vaults by the most sophisticated security measures, to ensure that greater security is delivered – as a service. However, appropriate protection must cover the end-to-end service, from the handset to the remote server. Cloud-based data travels through operators’ networks, so their network must also be fortified, by encryptions and secure Internet tunnelling. In the Asia Pacific (APAC )region security issues grow faster than anywhere else, fuelled by unprecedented growth of mobile devices. Many users in this region are introduced to the Internet via mobiles, not PCs. This precipitates the next wave of mobile Trojans, which are harder to detect than ever and are most rife in APAC. Mobile security calls for a more innovative approach and real-time defences. The idea of ‘attack the attackers’ may not work for the Internet, due to its nature, and you can never know for sure who ‘patient zero’ is – so ‘passive’ defences should be bolstered. In this edition, these issues are discussed openly, and statistical evidence is presented. Read about remedial solutions for solving IPTV content piracy. Read about stronger authentication with one-time-password and Cloud-based encryption services. For defending operators’ networks, the Big Network Analytics provide deep insights by analysing network/subscriber abnormalities that can spot an attack in real-time. The dark side is evidently expanding, but so do the defenders of the light, in this unceasing battle. We are pleased to send this complimentary electronic version of the latest issue of Connect-World Asia-Pacific I 2014 for your enjoyment and information. ICT is changing our world. Can you keep up with the changes? Can you follow how these changes transform the way people live and do business? Let Connect-World help you. Connect-World, a ‘must read’ magazine directed at all the top regional and global ICT sector decision makers – users and providers alike of ICT services and products, highlights the needs of each of the world’s regions and encourages constructive discussion of ICT issues and the challenges and opportunities they bring. To access this issue of Connect-World Asia-Pacific I 2014, just click on the link below.
| Follow us on |
Latest ICT Event
| |
Magazine regions • Global-ICT | |
This issue is devoted to Security – lighting up a dark landscape and features the following articles by sector leaders:
We hope you enjoy it. Rebecca Copeland | |
What can Connect-World offer you?
For more information contact sales and marketing at: sales@connect-world.com | |
Copyright © 2014 Connect-World. All rights reserved. | |
If you wish to cancel your subscription to this newsletter, {unsubscribe}Click here to unsubscribe{/unsubscribe} |
Security – lighting up a dark landscape
previous post