Google Analytics

Search This Blog


Tuesday, September 01, 2015

The Risks and Rewards of SSL Encryption (By Bluecoat)

Contributed By Bluecoat.

According to a recent Gartner study, SSL/TLS traffic now comprises 15-25 percent of total web traffic. Up to a third of enterprise internet traffic is now encrypted, and that figure is growing rapidly.

While encryption helps to keep private information private and secure, it is a double edged sword. “Bad guys” often use it to conceal advanced and targeted cyber threats, and to sneak out data without being noticed.

While encrypting web sessions protects end-user data from being viewed in transit over the Internet, it creates a blind spot for IT administrators; they typically have no visibility into SSL-encrypted traffic. Unfortunately, SSL has become one of the most popular ways to inject malware and mask malicious code, such as Trojan horses and viruses.

Gartner reports that less than 20 percent of organizations with NGFW or IPS appliances decrypt inbound or outbound SSL traffic. Gartner believes that by 2017, more that 50 percent of the network attacks will use encrypted SSL/TLS communications.

Hence, SSL network protocol, is one of those really interesting technologies that were designed to keep us safe on the Internet. Ironically, in doing so, it has completely disrupted the network security industry to a point where our protection and detection equipment have become blind.

Network operators have had to choose between two extremes in confronting these issues. They can take a draconian approach by blocking all SSL communications entirely, or allow SSL communications transparently, without inspection.

Friday, August 28, 2015

Brocade Analytics Monitoring Platform Enables Organisations to Achieve Greater RoI for Mission-Critical Applications

Aug 26, 2015:

Brocade today announced continued innovation in its Fibre Channel Storage Area Network (SAN) solutions with the introduction of the Brocade® Analytics Monitoring Platform. Representing a new product line for the company, the Brocade Analytics Monitoring Platform allows organizations to achieve greater ROI and reduced OpEx for their mission-critical applications by providing IT staff with the highest levels of monitoring and analytics between servers and storage. As a result, organizations can better ensure predictable performance and operational stability for their IT infrastructures.

NCR Signals Massive Makeover to Banking with Highly Secure Cloud-Based ATM Software Platform

Aug 25, 2015:
Danny Fong, Country Manager, NCR Malaysia

NCR today introduced the biggest change to the way an ATM operates since the self-service banking channel was invented nearly 50 years ago. NCR Corporation, the global leader in consumer transaction technologies, has launched Kalpana, an enterprise software platform that moves ATM software and operations to the cloud.

Kalpana software runs ATMs remotely, initially through a thin-client ATM including an Android operating system, and is designed to eliminate malware and enable rapid deployment of new devices and ATM services, to reduce costs by up to 40 percent, and create amazing customer experiences.

“This new cloud based software platform is a great response to the ATM security challenges faced by banks today and helps to greatly improve and accelerate the process of bringing new ATM services to market,” said Danny Fong, country manager, NCR Malaysia.

Thursday, August 27, 2015

IT News Week 5 Aug 2015

For week 4 of Aug 2015, the most interesting news was the announcement of 6TB hard disk by WD.

For this week / last week, here are / were the biggest news.
  • PR - Aug 27, 2015 - UOBAM Malaysia launches United Global Durable Equity Fund to help investors benefit from volatile market conditions
  • PR - Aug 26, 2015 - Kaspersky Lab Presents TECHBIZ, A New Business Platform, Seminar & Exhibitions
  • PR - Aug 26, 2015 - iPay88 Secures Over 60% Marketshare in The Online Payment Gateway Industry
  • PR - Aug 25, 2015 - RS-branded 3D printer accepts multiple filament materials for rapid prototyping
  • PR - Aug 24, 2015 - WeChat Commemorates Malaysia’s 58th Independence Day with Exclusive Stickers Drawn by Local Illustrator
  • PR - Aug 24, 2015 - Huawei Introduces Certification to Enhance Professional Competence among Tech Graduates
  • PR - Aug 21, 2015 - U Mobile receives first recognition at the Putra Brand Awards 2015

SimpliVity’s Omnistack : The Data Storage, Management, Mobility Software Infrastructure

1.) What is SimpliVity’s Omnistack ?

SimpliVity’s OmniStack technology consists of two main components —the OmniStack Data Virtualization Platform software and its revolutionary OmniStack Accelerator Card.

SimpliVity’s Data Virtualization Platform is SimpliVity’s data architecture. It is a globally-aware file system with data optimization techniques that enables a single shared compute and storage resource pool across multiple sites, and provides highly-efficient data storage, management, and mobility. It abstracts data from its underlying hardware, shifting policies and management from infrastructure components to the application workload/virtual machine level.

--> Software platform, includes support for low-level proprietary file system; it caters for data storage, data management, and data mobility.

The OmniStack Accelerator Card is a purpose-built PCIe card that offloads global inline built-in deduplication, compression, and optimization processes to ensure primary CPU resources are available to serve business applications.

--> Hardware, similar to graphic cards, meant for high efficiency data transfer.

2.) Why do we need it ?

The primary use case of Simplivity's Omnistack is to manage and host data between two or more locations such as between offices and data centers.

It is a all-in-one platform which caters for virtualization, WAN optimization, integrated security and data management.

This is coined as Hyperconverged Infrastructure Software.

Monday, August 24, 2015

11street Identifies Evolution in Malaysian Online Shopping Trends

Aug 20, 2015:

11street (, one of the largest online marketplaces in Malaysia, today showcases its Online Shopping Index, which identified the latest changes in online shopping behaviours of local consumers, as well as specific e-commerce insights during the four-week Ramadhan and Raya period from 22 June to 19 July.

The 11street Online Shopping Index for 2015 reveals that:
  • Malaysian online shopping behaviours are becoming more diverse
  • Men indulged in online shopping as much as women at a healthy ratio of 48 men: 52 women
  • Mobile is the future of e–commerce with nearly half of the people shop via mobile

In addition, the company also shares its business updates:
  • 11street’s gross merchandise value (GMV) has surged significantly by over 100% (Month-on-Month) during the Ramadhan and Raya period
  • Mobile shopping at 11street increased by 30 percent during the Ramadhan and Raya period
  • In just mere months, 11street achieved various milestones including a rank of 40 on Alexa

Sunday, August 23, 2015 : GST Free Online IT Hardware Retailer (Malaysia)

Check out

1.) Online IT hardware retailer.

2.) It sells desktop, laptop, monitor, tablet, smartphone, accessories and customized hardware.

3.) The products are sold without GST because the registered company is operating at revenue below GST requirement.

4.) The pricing includes delivery and supports nationwide (Malaysia).

5.) Payment is based on Paypal currently.

6.) For more information:

Phone: 0133928368 (mobile)

Saturday, August 22, 2015

Kaspersky Lab names the best startups of its first acceleration program

Aug 20, 2015 - P.J :

Kaspersky Lab is pleased to announce the winners of its inaugural Security Startup Challenge, selected at a grand final event at the Massachusetts Institute of Technology (USA) on 13 August. The prizes for the most promising startups were awarded to: Excalibur from Slovakia (1st place), Pipe from Germany (2nd place), Cyber DriveWare from Israel and ZeroDB from the USA who shared the 3rd place. Each team was awarded a share of an $80,000 prize fund as well as post-program support for the first prize.

At the grand finals at the technology mecca of MIT in Boston, a judging committee selected the teams with the most promising startups that had demonstrated the most significant improvement in their projects during SSC 2015:
  • The first place, $50,000 and post-program support went to Excalibur. The company provides seamless authentication to any legacy system such as PC/Mac/webpage to help mankind move away from passwords using a phone as a security token.
  • The second place and $20,000 went to Pipe, a secure browser-to-bowser file transfer service without a file size limit.
  • The third place and $10,000 was shared by two teams – Cyber DriveWare, a company that provides enterprises and critical infrastructures the ability to protect themselves against malware related business disruption attacks via patent-pending paradigm consisting of filter drivers and unique meta-data analyzes; and ZeroDB, developer of end-to-end encrypted database without exposing data or keys to the server.

Friday, August 21, 2015

IT News Week 4 Aug 2015

For week 2 of Aug 2015, the most interesting news was the announcement of Fastest Large-Format Colour and Monochrome Printer in Malaysia by HP.

For this week / last week, here are / were the biggest news.
  • PR - Aug 21, 2015 - WD Red Pro Drives Now Available In 6TB
  • PR - Aug 20, 2015 - HUAWEI P8 Wins EISA Consumer Smartphone Award
  • PR - Aug 20, 2015 - MGM Joins iFlix Family as Strategic Investor
  • PR - Aug 20, 2015 - DigiLand Signs MOU With Telecomm. Giant NTT MSC Sdn. Bhd.
  • PR - Aug 19, 2015 - Tata Comm. calls on technology enthusiasts to design a Formula 1® Grand Prix prediction tool for fans
  • PR - Aug 19, 2015 - SHENZHEN, CHINA - Huntkey Launches SSK407 USB Power Strip
  • PR - Aug 19, 2015 - Brocade Expands OEM Relationship with Lenovo
  • PR - Aug 18, 2015 - Laser Components: Bandpass Filters for Integration in a TO-39 Housing
  • PR - Aug 18, 2015 - RS Components further enhances website to improve the online customer journey

Akamai Q2 2015 State Of The Internet - Security Report

Akamai Technologies, Inc., the global leader in content delivery network (CDN) services, today announced the availability of the Q2 2015 State of the Internet – Security Report.

The ever increasing exposure of businesses to online threats is a growing one as attackers employ a combination of more sophisticated attacks; greater resources for brute force attacks; and a combination of tactics.

Akamai's belief is that the more you know about cyber security threats, the better you can defend your enterprise.

These attackers are continually changing the game by switching tactics, seeking out new vulnerabilities and even bringing back old techniques that were considered outdated.

By analyzing the attacks observed over our Akamai networks and those of their clients, Akamai has been able to identify emerging threats and trends and provide the public with the information to harden their networks, websites and application and improve their cloud security profiles.

This has necessitated the inclusion of new attack probabilities and platforms for monitoring purposes. For example, for this report, Akamai has added two web application attack vectors to our analysis; examined the perceived threat posed by the onion router (Tor) traffic; and even uncovered some new vulnerabilities in third-party WordPress plugins

Thursday, August 20, 2015

Malaysians Suffer from ‘Digital Amnesia’

Aug 14, 2015:

When we were young, we used to memorize our home phone number as well as our loved ones’ numbers. Alternatively, we would carry a personal diary containing contact numbers or contact cards. However, it is a different scenario today. Today, most of us would find it hard to recall any contact number from our contacts list. Why? Because we rely too much on technology.

As part of Kaspersky Lab’s commitment to help people protect sensitive and important data in an online-enabled world, it has conducted a survey of 1,001 Malaysians aimed at better understanding how digital devices and the Internet affect the way consumers recall and use information; as well as their precautionary measures to protect it. Similar surveys were also conducted in other countries.

Wednesday, August 19, 2015

IBM unveils Linux-Only Mainframe

Aug 17, 2015 - Seattle:

IBM is betting big on open source in the enterprise - announced a significant expansion of the mainframe’s strategy of embracing open source-based technologies and open-source communities to provide clients with the most secure Based on Common Criteria EAL5+ security rating for z Systems mainframe, U.S. National Vulnerability Database, Solitaire CX Study and ITIC Study., highest performance capabilities for an era where mainframes increasingly anchor corporate analytics and hybrid clouds.

  • Unveiling the most secure Linux servers in the industry – The company is introducing two Linux mainframe servers – LinuxONE - that can perform 30 billion RESTful web interactions/day with Dockerized Node.js and MongoDB, driving over 470K database read and writes per second.
  • Deepening open source software enablement – IBM will enable open source and industry tools and software including Apache Spark, Node.js, MongoDB, MariaDB, PostgreSQL, Chef and Docker on z Systems to provide clients with choice and flexibility for hybrid cloud deployments. SUSE, which provides Linux distribution for the mainframe, will now support KVM, giving clients a new hypervisor option. Canonical and IBM also announced plans to create an Ubuntu distribution for LinuxONE and z Systems. The collaboration with Canonical brings Ubuntu’s scale-out and cloud expertise to the IBM z Systems platform, further expanding its reach and support.
  • Contributing the single largest amount of mainframe code to open source community – The code, designed to fuel digital transformation, includes technology from IBM’s mainframe to help enterprises identify issues and help prevent failures before they happen, help improve performance across platforms and enable better integration with the broader network and cloud.

Thursday, August 13, 2015

Cyberjaya City Hacks Challenge Makes its Debut at 2015 BAC 2.0

Aug 13, 2015 - Cyberjaya

Following the success of the National Big App Challenge (BAC) 1.0 in 2014 organized by Multimedia Development Corporation (MDeC) and Tentspark, the BAC 2.0 this year returns with the addition of the Cyberjaya City Hacks Challenge (CCH) to its repertoire. The CCH is a competition open to individuals, developers, ISV, tech start-ups and students to compete in showcasing the best in innovative solutions through mobile applications.

Hosted at Cyberjaya, the competition is aimed at encouraging participants to combine creativity and broadband, coupled with big data sets to develop applications designed at enhancing the quality of life and performance of urban services in smart cities. These big data sets will be provided by Cyberview Sdn. Bhd; Majlis Perbandaran Sepang and MapIT MSC Sdn. Bhd
Faris Yahaya, Managing Director of Cyberview

Faris Yahaya, Managing Director of Cyberview, echoes this sentiment saying, “The CCH is an ideal platform to empower the society with greater digital capability. It promotes the use of broadband and creativity leveraging on Big Data Analytics (BDA) and open data, an ideal approach to further develop and enhance smart city living.

The CCH will be preceded by an ideation workshop, follow by a ‘Hack & Pitch’ process where ten finalists will be selected. The finalists will then be given five more days to fine-tune their app before submitting their videos to face the judges at the grand finals.

The top 3 winners of the CCH will each get to join the BDA Accelerator Programme worth RM50,000. Moreover, the CCH also offers a special prize worth RM10,000 to develop a Cyberjaya Smart City Pilot App.