Entries by Esther Jeohn

Majority of Companies Are Not Disclosing Their Data Breaches

It is a common misconception to think that companies absolutely must disclose details of any internal breaches they may have suffered. In reality, the majority of data breaches go unreported, and details of the leak are rarely revealed to the public. Recently in the media, Yahoo came under fire and heavy scrutiny for late disclosure […]

Love in All the Wrong Places: the Dangers of Online Dating

As February 14th creeps closer, hype over finding a valentine is at its peak. But finding a significant other does pose more difficulty in this day and age with the rise of career-driven individuals, slaving away with the chaotic schedules of everyday life. Furthermore, with the digital world just an arm’s length away, it’s not […]

Online Safety Tips from Penta Security, 2017 Data Privacy Day Champion

A Data Privacy Day Champion this year, Penta Security believes that organizations, businesses and governments are collectively responsible for being conscientious stewards of personal information. For Penta Security, this year marks two decades of experience in protecting an asset valued by all: personal data. Data Privacy Day, held annually on January 28, is a worldwide […]

WAPPLES Web Application Firewall Interoperability for HPE Security ArcSight

Integration allows customers to increase effective security operations for quicker detection and response Penta Security Systems Inc., a leading Web and Data security provider in the Asian-Pacific region, announced its partnership with HPE through the HPE Security Technology Alliance Partners (TAP) Program. The partnership allows for customers to integrate the HPE ArcSight solution with Penta Security’s web […]

PCI DSS and the Road to Compliance

When you’re in the world of cyber security and researching new products, there’s no doubt that you’ll run into a plethora of acronyms. With the large amounts of advanced technology and the technical terms there are, it’s easier to shorten them to save some time and space. However, sometimes all the terminology begins to run […]

The Benefits of Using Signature-less Detection Technology

Cloudbric takes pride in being different from its competitors. With over 19 years of information security experience, Cloudbric Business Edition (BE) utilizes a Web Application Firewall (WAF) based on Penta Security’s unique logic based hardware WAF called WAPPLES. Managing your enterprise’s security has never been easier, not to mention cost saving. Cloudbric BE is a […]

What Does ‘Website’ Mean to CMS Users?

The definition and concept of website will invariably differ depending on the demographic you’re questioning. Defined literally, a website is a connected group of pages on the internet that use unique addresses and routes on the network, which are based on internet protocols. But who can actually understand this kind of explanation? CMS has become the leading solution […]