Shadow IT Explained

Shadow IT refers to the usage of applications, devices, software, and other IT services outside the approval and guidance of the IT department. While it poses risks for employees and their...

SIEM Explained

Security Information and Event Management (SIEM) is a set of services and tools that combine Security Information Management (SIM) responsible for the consolidation of log files and data to generate...

SIM Swap Attack Explained

A SIM swap attack is a cunning form of social engineering that exploits a mobile carrier's service to port phone numbers. In this scheme, attackers hijack a victim's phone number by...

Smart Contracts Explained

The concept of storing data in a secure ledger is expanded to include computation in a smart contract. Therefore, they are essentially contracts that are carried out automatically and without the...

Smishing Explained

Smishing is a form of cyber attack utilising SMS (Short Message Service) or text messages to target individuals. It's a clever blend of "SMS" and " phishing ," the common...

Social Engineering Explained

Social engineering refers to a variety of tactics that can be used to trick people into becoming a victim of cybercrime, for example, by opening a malicious attachment, clicking on an unsafe link or...

Software Defined Datacentre

Software Defined Datacentre (SDDC) refers to modern datacentres where the entire infrastructure is virtualised then managed and orchestrated via software. This means that hardware configuration and...

Software-Defined Networking (SDN) Explained

Software-Defined Networking, or SDN, is a revolutionary approach to network management that decouples the control plane from the data plane. Traditionally, network devices like routers and switches...

Software-Defined Storage Explained

Software-Defined Storage (SDS) is an approach in computer data storage where the software is the one responsible for data management, data placement control and data provisioning, instead of the...

Spear Phishing Explained

Spear phishing is a highly targeted cyber attack designed to deceive individuals or organisations into revealing sensitive information. Unlike traditional phishing , which casts a wide net...

© Asia Online Publishing Group Sdn Bhd 2024
Powered by