Defence in Depth
The problem with bug bounties, white-hat hacking … and analysts!
Bug bounty programmes may have some use, but they are flawed to begin with, according to a Tenable Network Security senior exec.
Baking in security, the Microsoft way
With Windows still holding a dominant desktop market share, Microsoft believes it has a view into security that no other vendor has, and can muster resources others lack, writes Benjamin Cher.
Navigating the new world: IoT security Part II
With the Internet of Things (IoT) fast becoming the default setting of our professional and personal lives, more attention needs to be paid to security. In this, the second of two parts, Digital News Asia (DNA) speaks to experts from a range of backgrounds.
Cutting the wire: IoT security Part I
Are companies aware of the need for security in the new IoT world? How are they balancing the need for security with that of ease of use? Is security just an afterthought? Benjamin Cher finds out.