APNIC eLearning: Network Security Fundamentals

January 9, 2018

Confidentiality. prevents unauthorized use or disclosure of information. Integrity. safeguards the accuracy and completeness of information. Availability. authorized users have reliable and timely access to information. The Internet was initially designed for connectivity – Trust assumed – We do more with the Internet nowadays – Security protocols are added on top of the TCP/IP.

Spotlight

GhostMail

GhostMail is a cyber security company specialized in secure and private encrypted communications. Fed up with the ever-increasing threat of hackers, mass surveillance and cyber-crimes, we decided to help everybody to communicate securely and change the digital privacy landscape. We have a strong belief in the fundamental right to online privacy, and that exercising this right should be free, easy and available to both consumers and businesses. E-crime has come to stay and people need to take action and protect themselves. We offer the perfect solutions to mitigate the growing threat of Internet communications. Our highly encrypted services are easy to use and requires no downloads or software installments and can be used on Mac, PC and mobile. GhostMail has built a strong team of security geeks, encryption specialist, coders and MBA’s working from offices in Scandinavia and Switzerland. The founders are experienced Internet entrepreneurs and have the energy, vision and p

OTHER WHITEPAPERS
news image

OT/IoT Security Report Cyber War Insights, Threats and Trends, Recommendations

whitePaper | August 30, 2022

Nozomi Networks Labs is dedicated to reducing cyber risk for the world’s industrial and critical infrastructure organizations. Through its cybersecurity research and collaboration with industry and institutions, it helps defend the operational systems that support everyday life. The Labs team conducts investigations into industrial device vulnerabilities and, through a responsible disclosure process, contributes to the publication of advisories by recognized authorities.

Read More
news image

2022 Trends in Securing Digital Identities

whitePaper | August 22, 2022

Managing the ecosystem of identities accessing enterprise resources has only gotten more complicated during the past several years. Between the increasing number of identities, the challenges posed by phishing attacks, and the continued growth of cloud adoption, enterprises are under pressure to ensure the army of remote workers, contractors, and employees accessing network resources are doing so securely and successfully.

Read More
news image

Adobe Primetime Advertising Security Overview

whitePaper | December 30, 2022

At Adobe®, we take the security of your digital experience and assets seriously. Security practices are integrated into our internal software development processes, operations, and tools. Our cross-functional incident response teams are proactive and nimble in preventing, detecting, and responding to incidents. Furthermore, our collaborative work with partners, leading researchers, and other industry organizations helps us stay updated with the latest threats, vulnerabilities, and security best practices; thereby enabling us to continually build security into the products and services we offer and regularly incorporate advanced security techniques into our product and service offerings.

Read More
news image

HMC 1030 Connectivity Security White Paper

whitePaper | March 14, 2023

This document describes data that is exchanged between the Hardware Management Console (HMC) and the IBM Service Delivery Center (SDC). In addition, it also covers the methods and protocols for this exchange. This includes the configuration of “Call Home” (Electronic Service Agent) on the HMC for automatic hardware error reporting. All the functionality that is described herein refers to Power Systems HMC and the HMC that is used for the IBM Storage System DS8000.

Read More
news image

Leading Cybersecurity in Higher Education

whitePaper | February 11, 2023

Higher-education institutions are experiencing a high volume of cyberattacks and greater vulnerability to threats. Today’s educational technology environments connect a variety of endpoints—laptops, desktops, student management data, and email servers. They use Internet-of-Things (IoT) devices for managing environmental controls, security cameras, and door alarms. Both ends of the education spectrum gather, store, and use personal data from students and staff—and if they collect it, they must also protect it. As a result, schools need dedicated, skilled, and experienced executive leadership that is empowered, resourced, and responsible for campuswide cybersecurity issues.

Read More
news image

Best Practices for Common Cybersecurity Threats

whitePaper | November 28, 2022

The threat of Criminal cyber activity continues to grow for organizations around the world, targeting everyone from select individuals to leading corporations and federal governments.

Read More

Spotlight

GhostMail

GhostMail is a cyber security company specialized in secure and private encrypted communications. Fed up with the ever-increasing threat of hackers, mass surveillance and cyber-crimes, we decided to help everybody to communicate securely and change the digital privacy landscape. We have a strong belief in the fundamental right to online privacy, and that exercising this right should be free, easy and available to both consumers and businesses. E-crime has come to stay and people need to take action and protect themselves. We offer the perfect solutions to mitigate the growing threat of Internet communications. Our highly encrypted services are easy to use and requires no downloads or software installments and can be used on Mac, PC and mobile. GhostMail has built a strong team of security geeks, encryption specialist, coders and MBA’s working from offices in Scandinavia and Switzerland. The founders are experienced Internet entrepreneurs and have the energy, vision and p

Events