sales@ishantech.net +603-79319471


 2016 – IshanTech (M) Sdn Bhd awarded as
Outstanding PPS Achievements – Commercial Category by HP

 

2016 – IshanTech (M) Sdn Bhd awarded as
New Business Champion of 2016 from ESET Malaysia

2016 – IshanTech (M) Sdn Bhd recognized as
TOP 25 CYBER SECURITY Technologies Companies 2017
APAC CIO Outlook – IshanTech

 




WeLiveSecurity News, views, and insight from the ESET security community


  • 4053440 - Securely opening Microsoft Office documents that contain Dynamic Data Exchange (DDE) fields - Version: 3.0
    on January 9, 2018 at 6:00 pm

    Revision Note: V3.0 (January 9, 2018): Microsoft has released an update for all supported editions of Microsoft Excel that allows users to set the functionality of the DDE protocol based on their environment. For more information and to download the update, see ADV170021.Summary: Microsoft is releasing this security advisory to provide information regarding security settings for Microsoft Office applications. This advisory provides guidance on what users can do to ensure that these applications are properly secured when processing Dynamic Data Exchange (DDE) fields. […]

  • 4056318 - Guidance for securing AD DS account used by Azure AD Connect for directory synchronization - Version: 1.0
    on December 12, 2017 at 6:00 pm

    Revision Note: V1.0 (December 12, 2017): Advisory published.Summary: Microsoft is releasing this security advisory to provide information regarding security settings for the AD DS (Active Directory Domain Services) account used by Azure AD Connect for directory synchronization. This advisory also provides guidance on what on-premises AD administrators can do to ensure that the account is properly secured. […]

  • 4038556 - Guidance for securing applications that host the WebBrowser Control - Version: 1.0
    on August 8, 2017 at 5:00 pm

    Revision Note: V1.0 (August 8, 2017): Advisory published.Summary: Microsoft is releasing this security advisory to provide information regarding security settings for applications developed with the Microsoft Internet Explorer layout engine, also known as the Trident layout engine. This advisory also provides guidance on what developers and individuals can do to ensure that their applications hosting the WebBrowser Control are properly secured. […]

  • 4033453 - Vulnerability in Azure AD Connect Could Allow Elevation of Privilege - Version: 1.0
    on June 27, 2017 at 5:00 pm

    Revision Note: V1.0 (June 27, 2017): Advisory published.Summary: Microsoft is releasing this security advisory to inform customers that a new version of Azure Active Directory (AD) Connect is available that addresses an Important security vulnerability. […]

  • 4025685 - Guidance related to June 2017 security update release - Version: 1.0
    on June 13, 2017 at 5:00 pm

    Revision Note: V1.0 (June 13, 2017): Advisory publishedSummary: Microsoft is announcing the availability of additional guidance for critical security updates, that are at heightened risk of exploitation due to past and threatened nation-state attacks and disclosures. Some of the releases are new, and some are for older platforms that we are making publicly available today. […]


  • Linux Servers and Encryption – the Need and the Solution
    by Garry McCracken on January 24, 2019 at 9:43 pm

    In the past, I have tried to make the case for encrypting physical servers on premises.  The argument for not needing to encrypt them is that these servers usually run for weeks, months, or even years without being brought down. And, that they are physically protected within a well-fortified data center.  The protection that Full […] The post Linux Servers and Encryption – the Need and the Solution appeared first on SecureSpeak | WinMagic Data Security Blog. […]

  • Full Drive Encryption, Key management and MBAM
    by Garry McCracken on December 14, 2018 at 4:42 pm

    (Microsoft announces end of mainstream support for MBAM as of July 2019) WinMagic’s CEO, THI NGUYEN-HUU, has blogged in the past about the ideal architecture for Full Drive Encryption, and Key Management (Separating Encryption and Key Management).  By separating key management, which includes authentication, from the actual encryption layer, one is able to use a […] The post Full Drive Encryption, Key management and MBAM appeared first on SecureSpeak | WinMagic Data Security Blog. […]

  • Self-encrypting deception: Weaknesses in the encryption of solid state drives (SSDs)
    by Garry McCracken on December 7, 2018 at 4:09 pm

    In the past few weeks I have been looking into the fallout from the paper [PDF] by Carlo Meijer and Bernard van Gastel from Radboud University, the Netherlands titled “Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs)”. From the paper’s abstract:  “In theory, the security guarantees offered by hardware encryption are similar to or […] The post Self-encrypting deception: Weaknesses in the encryption of solid state drives (SSDs) appeared first on SecureSpeak | WinMagic Data Security Blog. […]

  • Your Feedback Is Important To Us
    by Kevin David on November 26, 2018 at 5:23 pm

    For me, the title of this blog entry isn’t just a marketing slogan or a catch phrase. It’s something that I take very seriously because, just like the metrics that I keep track of, acting on feedback from customers allows the Technical Support team here at WinMagic to improve to serve you better.  That’s the […] The post Your Feedback Is Important To Us appeared first on SecureSpeak | WinMagic Data Security Blog. […]

  • Protecting Cloud Workloads against Undisclosed Access in Microsoft Azure
    by Leo Ezhil on October 22, 2018 at 6:02 pm

    An international law firm and longtime customer of WinMagic has leveraged our flagship encryption and key management platform – SecureDoc Enterprise Server – to protect thousands of endpoint devices against loss or theft. In this era of digital transformation though, protecting endpoints is only one of many projects within their security and risk management portfolio. […] The post Protecting Cloud Workloads against Undisclosed Access in Microsoft Azure appeared first on SecureSpeak | WinMagic Data Security Blog. […]