Entries by Penta Security

TrickBot: The Picky Malware

It’s often assumed that malware is created to spread to as many recipients, as quickly as possible. With email and social media being the main channels for the spread, you might think that malware infects its victims randomly. However, that’s not always the case. Some malware go after the big fish, targeting only a specific […]

MyDiamo Expands Open Source Database Encryption Offerings to Include PostgreSQL

PostgreSQL will join existing supported platforms of MySQL, MariaDB and Percona as open source database adoption continues to grow. Alongside the expansion, Penta Security Systems Inc. has begun this year to offer NGOs free unlimited usage of the solution. Leading data encryption vendor Penta Security Systems Inc. announced on September 19 at Singapore International Cyber […]

Penta Security to Showcase Its Latest IoT Security Developments and Solutions at GovWare 2017

During Singapore’s International Cyber Week (SICW), Penta Security Systems Inc. will be exhibiting at this year’s GovWare, showcasing its web security and encryption offerings to empower large scale IoT and cloud deployment, with security at the forefront. As the APAC region’s premier conference and platform for building partnerships in cyber security, GovWare will gather industry […]

Biometrics in Action: Where Are Popular Forms of Authentication Being Used?

We’ve discussed the differences between two-factor authentication (2FA) and multi-factor authentication (MFA) in a blog post over at Cloudbric, and one of the differentiating factors discussed was inherence factors. Inherence factors are criteria that relate to “something you are,” and therefore include identifiable biometric characteristics — iris scans, fingerprints, voice authentication all fall under this […]

The Limitations of Website Security Plugins

If you’re a website owner, you’re probably using a myriad of plugins either to add additional functionalities to your website or simply enhance its aesthetics. You might even be using a security plugin on your site. However, though affordable and convenient, website security plugins may cause complications and may not even be protecting your site […]

Why You Should Care About IoT Security

You might not be one of the two-thirds of Americans currently owning and utilizing IoT (Internet of Things) devices, so news on IoT security may not pique your interest or alarm you, but it should. IoT security affects you in more ways than you realize. With IoT quickly progressing, it’s not just the number of […]

The Flaws with Detect and Respond

There has been a lot of discussion around Detect and Respond but there remains a number of misconceptions and misunderstandings about this particular cyber security framework. Many companies hold the notion that perfect security isn’t achievable, and perhaps they’ve given up hope on blocking cyber attacks through preventive measures. Therefore, most flock to Detect and […]

5 Medical Devices with Exposed Vulnerabilities

The medical field has changed for the better, with technology allowing people to live longer and lead healthier lives with fewer health complications. Unfortunately, as medical devices become more advanced with the Internet of Things (IoT) introduced into the picture, security concerns arise. It wasn’t just the recent WannaCry ransomware attack that demonstrated the vulnerability […]

Top 10 Cyber Security Lingo You Need to Know

“Jargon” is defined as a set of words that are used by a particular group, usually in a specific industry or profession, and difficult for others to understand. However, within the context of cyber security, certain jargon is starting to make its way into mainstream conversation and news, hinting at the increasing importance in understanding […]