sales@ishantech.net +603-79319471


 2016 – IshanTech (M) Sdn Bhd awarded as
Outstanding PPS Achievements – Commercial Category by HP

 

2016 – IshanTech (M) Sdn Bhd awarded as
New Business Champion of 2016 from ESET Malaysia

2016 – IshanTech (M) Sdn Bhd recognized as
TOP 25 CYBER SECURITY Technologies Companies 2017
APAC CIO Outlook – IshanTech

 




WeLiveSecurity News, views, and insight from the ESET security community

  • Week in security with Tony Anscombe
    by Tomáš Foltýn on February 21, 2020 at 1:00 pm

    Hunting down Linux threats – The implications of DNS encryption for business security – MGM Resorts breach hits millions of people The post Week in security with Tony Anscombe appeared first on WeLiveSecurity […]

  • Up close and personal with Linux malware
    by Tomáš Foltýn on February 21, 2020 at 10:30 am

    What are the main security threats facing Linux? A Q&A with ESET Senior Malware Researcher Marc‑Etienne M.Léveillé, whose work has been instrumental in uncovering a number of malware strains hitting Linux servers. The post Up close and personal with Linux malware appeared first on WeLiveSecurity […]

  • MGM Resorts data breach exposes details of 10.6 million guests
    by Amer Owaida on February 20, 2020 at 3:52 pm

    A number of celebrities, government officials and tech CEOs were also caught up in the incident The post MGM Resorts data breach exposes details of 10.6 million guests appeared first on WeLiveSecurity […]

  • Linux and malware: Should you worry?
    by Tomáš Foltýn on February 20, 2020 at 10:30 am

    Malicious code is nothing to worry about on Linux, right? Hold your penguins. How Linux malware has gone from the sidelines to the headlines. The post Linux and malware: Should you worry? appeared first on WeLiveSecurity […]

  • What DNS encryption means for enterprise threat hunters
    by Guest Writer on February 19, 2020 at 10:30 am

    The dawn of the DNS over HTTPS era is putting business security and SOC teams to the challenge The post What DNS encryption means for enterprise threat hunters appeared first on WeLiveSecurity […]


  • 4053440 - Securely opening Microsoft Office documents that contain Dynamic Data Exchange (DDE) fields - Version: 3.0
    on January 9, 2018 at 6:00 pm

    Revision Note: V3.0 (January 9, 2018): Microsoft has released an update for all supported editions of Microsoft Excel that allows users to set the functionality of the DDE protocol based on their environment. For more information and to download the update, see ADV170021.Summary: Microsoft is releasing this security advisory to provide information regarding security settings for Microsoft Office applications. This advisory provides guidance on what users can do to ensure that these applications are properly secured when processing Dynamic Data Exchange (DDE) fields. […]

  • 4056318 - Guidance for securing AD DS account used by Azure AD Connect for directory synchronization - Version: 1.0
    on December 12, 2017 at 6:00 pm

    Revision Note: V1.0 (December 12, 2017): Advisory published.Summary: Microsoft is releasing this security advisory to provide information regarding security settings for the AD DS (Active Directory Domain Services) account used by Azure AD Connect for directory synchronization. This advisory also provides guidance on what on-premises AD administrators can do to ensure that the account is properly secured. […]

  • 4038556 - Guidance for securing applications that host the WebBrowser Control - Version: 1.0
    on August 8, 2017 at 5:00 pm

    Revision Note: V1.0 (August 8, 2017): Advisory published.Summary: Microsoft is releasing this security advisory to provide information regarding security settings for applications developed with the Microsoft Internet Explorer layout engine, also known as the Trident layout engine. This advisory also provides guidance on what developers and individuals can do to ensure that their applications hosting the WebBrowser Control are properly secured. […]

  • 4033453 - Vulnerability in Azure AD Connect Could Allow Elevation of Privilege - Version: 1.0
    on June 27, 2017 at 5:00 pm

    Revision Note: V1.0 (June 27, 2017): Advisory published.Summary: Microsoft is releasing this security advisory to inform customers that a new version of Azure Active Directory (AD) Connect is available that addresses an Important security vulnerability. […]

  • 4025685 - Guidance related to June 2017 security update release - Version: 1.0
    on June 13, 2017 at 5:00 pm

    Revision Note: V1.0 (June 13, 2017): Advisory publishedSummary: Microsoft is announcing the availability of additional guidance for critical security updates, that are at heightened risk of exploitation due to past and threatened nation-state attacks and disclosures. Some of the releases are new, and some are for older platforms that we are making publicly available today. […]


  • Protecting your Corporate Assets with Cryptographic Keys: An Interview with our VP of Technology, Garry McCracken
    by Aaron McIntosh on January 30, 2020 at 6:13 pm

    Our Vice President of Technology, Garry McCracken was recently invited to participate in an interview by Ravi Das, CyberSecurity Consultant and host of BiometricNews.net, a podcast for security news and information.  The podcast offers a glimpse into Garry’s career journey, and how he ultimately landed on a career in cryptography, and with WinMagic. Through the... The post Protecting your Corporate Assets with Cryptographic Keys: An Interview with our VP of Technology, Garry McCracken appeared first on SecureSpeak | WinMagic Data Security Blog. […]

  • Connecting to Customers through Feedback
    by Aaron McIntosh on January 21, 2020 at 3:08 pm

    We here at WinMagic take customer feedback seriously.  From Product Development and Management, to Sales and Marketing, to Billing and Support, we’re always striving to do what’s right for our customers.  On our Support team, we’ve recently revamped our customer experience process to better address the feedback that we receive from our customers. In 2019,... The post Connecting to Customers through Feedback appeared first on SecureSpeak | WinMagic Data Security Blog. […]

  • FDE and the Opportunistic vs Dedicated Adversary (Do a Risk Assessment)
    by Garry McCracken on November 25, 2019 at 1:54 pm

    I have always been a proponent of doing a security risk assessment in order to determine the amount and depth of controls required to protect information appropriately.   Risk is a function of the probability and the impact of a successful attack.   The higher the probability, and the higher the impact, the higher the risk. For... The post FDE and the Opportunistic vs Dedicated Adversary (Do a Risk Assessment) appeared first on SecureSpeak | WinMagic Data Security Blog. […]

  • WinMagic – our vision for better data security in a complex world.
    by Thi Nguyen-Huu on August 19, 2019 at 2:44 pm

    It has been over 21 years since I founded WinMagic and started working on SecureDoc, a simple but sophisticated full disk encryption product.   Over the years I have learned a lot and developed insights and opinions regarding the state of data security and the role encryption should play in it.   Of course these insights and... The post WinMagic – our vision for better data security in a complex world. appeared first on SecureSpeak | WinMagic Data Security Blog. […]

  • When and where should sensitive data be encrypted? The revealing answers might surprise you!
    by Thi Nguyen-Huu on June 27, 2019 at 2:45 pm

    After having run WinMagic with the main focus as a data encryption company for more than 20 years, I asked our team for the first time last week the very basic question: When – and where – should sensitive data be encrypted? The answers are eye opening for me. Ideally, sensitive data should always be... The post When and where should sensitive data be encrypted? The revealing answers might surprise you! appeared first on SecureSpeak | WinMagic Data Security Blog. […]