sales@ishantech.net +603-79319471


 2016 – IshanTech (M) Sdn Bhd awarded as
Outstanding PPS Achievements – Commercial Category by HP

 

2016 – IshanTech (M) Sdn Bhd awarded as
New Business Champion of 2016 from ESET Malaysia

2016 – IshanTech (M) Sdn Bhd recognized as
TOP 25 CYBER SECURITY Technologies Companies 2017
APAC CIO Outlook – IshanTech

 




WeLiveSecurity News, views, and insight from the ESET security community

  • Education and privacy legislation at ChannelCon
    by Lysa Myers on August 21, 2019 at 9:30 am

    As education is becoming an increasingly vital tool in companies’ security toolboxes, the question arises: How can they effectively implement security awareness training? The post Education and privacy legislation at ChannelCon appeared first on WeLiveSecurity […]

  • Ransomware wave hits 23 towns in Texas
    by Tomáš Foltýn on August 20, 2019 at 3:25 pm

    The attack, which has victimized mostly smaller local governments, is thought to have been unleashed by a single threat actor The post Ransomware wave hits 23 towns in Texas appeared first on WeLiveSecurity […]

  • Week in security with Tony Anscombe
    by Tomáš Foltýn on August 16, 2019 at 1:30 pm

    This week, ESET researchers described an ongoing campaign that targets accountants in the Balkans and spreads both a backdoor and a remote access trojan The post Week in security with Tony Anscombe appeared first on WeLiveSecurity […]

  • AI: Artificial Ignorance
    by Jake Moore on August 16, 2019 at 9:30 am

    Does true Artificial Intelligence even exist yet? Will it ever exist or will it end the world before we reach its full capacity? The post AI: Artificial Ignorance appeared first on WeLiveSecurity […]

  • Microsoft warns of new BlueKeep‑like flaws
    by Tomáš Foltýn on August 15, 2019 at 1:10 pm

    Unlike BlueKeep, however, these vulnerabilities affect more recent Windows versions, including Windows 10 The post Microsoft warns of new BlueKeep‑like flaws appeared first on WeLiveSecurity […]


  • 4053440 - Securely opening Microsoft Office documents that contain Dynamic Data Exchange (DDE) fields - Version: 3.0
    on January 9, 2018 at 6:00 pm

    Revision Note: V3.0 (January 9, 2018): Microsoft has released an update for all supported editions of Microsoft Excel that allows users to set the functionality of the DDE protocol based on their environment. For more information and to download the update, see ADV170021.Summary: Microsoft is releasing this security advisory to provide information regarding security settings for Microsoft Office applications. This advisory provides guidance on what users can do to ensure that these applications are properly secured when processing Dynamic Data Exchange (DDE) fields. […]

  • 4056318 - Guidance for securing AD DS account used by Azure AD Connect for directory synchronization - Version: 1.0
    on December 12, 2017 at 6:00 pm

    Revision Note: V1.0 (December 12, 2017): Advisory published.Summary: Microsoft is releasing this security advisory to provide information regarding security settings for the AD DS (Active Directory Domain Services) account used by Azure AD Connect for directory synchronization. This advisory also provides guidance on what on-premises AD administrators can do to ensure that the account is properly secured. […]

  • 4038556 - Guidance for securing applications that host the WebBrowser Control - Version: 1.0
    on August 8, 2017 at 5:00 pm

    Revision Note: V1.0 (August 8, 2017): Advisory published.Summary: Microsoft is releasing this security advisory to provide information regarding security settings for applications developed with the Microsoft Internet Explorer layout engine, also known as the Trident layout engine. This advisory also provides guidance on what developers and individuals can do to ensure that their applications hosting the WebBrowser Control are properly secured. […]

  • 4033453 - Vulnerability in Azure AD Connect Could Allow Elevation of Privilege - Version: 1.0
    on June 27, 2017 at 5:00 pm

    Revision Note: V1.0 (June 27, 2017): Advisory published.Summary: Microsoft is releasing this security advisory to inform customers that a new version of Azure Active Directory (AD) Connect is available that addresses an Important security vulnerability. […]

  • 4025685 - Guidance related to June 2017 security update release - Version: 1.0
    on June 13, 2017 at 5:00 pm

    Revision Note: V1.0 (June 13, 2017): Advisory publishedSummary: Microsoft is announcing the availability of additional guidance for critical security updates, that are at heightened risk of exploitation due to past and threatened nation-state attacks and disclosures. Some of the releases are new, and some are for older platforms that we are making publicly available today. […]


  • WinMagic – our vison for better data security in a complex world.
    by Thi Nguyen-Huu on August 19, 2019 at 2:44 pm

    It has been over 21 years since I founded WinMagic and started working on SecureDoc, a simple but sophisticated full disk encryption product.   Over the years I have learned a lot and developed insights and opinions regarding the state of data security and the role encryption should play in it.   Of course these insights and... The post WinMagic – our vison for better data security in a complex world. appeared first on SecureSpeak | WinMagic Data Security Blog. […]

  • When and where should sensitive data be encrypted? The revealing answers might surprise you!
    by Thi Nguyen-Huu on June 27, 2019 at 2:45 pm

    After having run WinMagic with the main focus as a data encryption company for more than 20 years, I asked our team for the first time last week the very basic question: When – and where – should sensitive data be encrypted? The answers are eye opening for me. Ideally, sensitive data should always be... The post When and where should sensitive data be encrypted? The revealing answers might surprise you! appeared first on SecureSpeak | WinMagic Data Security Blog. […]

  • YOUR LINUX-BASED LAPTOPS, DESKTOPS AND SERVERS: DO YOU NEED TO ENCRYPT THEM TO COMPLY WITH GDPR?
    by WinMagic on May 28, 2019 at 3:07 pm

    On April 24, 2018 Patrick Townsend, CEO and founder of Townsend Security published a blog considering the relevance of encryption to GDPR compliance.   A year later, we agree that Mr. Townsend’s blog remains a relevant starting point for enterprises on-the-fence about the wisdom of encrypting all data.  As we hit the 1-year anniversary of the... The post YOUR LINUX-BASED LAPTOPS, DESKTOPS AND SERVERS: DO YOU NEED TO ENCRYPT THEM TO COMPLY WITH GDPR? appeared first on SecureSpeak | WinMagic Data Security Blog. […]

  • Great Product Development Begins with a Solid Foundation of Corporate Excellence
    by Zia Babar on April 3, 2019 at 6:04 pm

    Enterprises are increasingly concerned about data security and data protection.  They need to have access to the rights tools to ensure that users and systems administrators are able to properly protect and secure company and customer data.  As a member of WinMagic’s technical team, I believe that WinMagic’s unique engineering environment is a source of... The post Great Product Development Begins with a Solid Foundation of Corporate Excellence appeared first on SecureSpeak | WinMagic Data Security Blog. […]

  • “Extracting BitLocker keys from a TPM”
    by Thi Nguyen-Huu on March 18, 2019 at 11:50 pm

    (Pre-Boot Authentication: Wisdom in Security – Part 3) In my September 2018 blog “Pre-Boot Authentication. Wisdom in Security Part 2”  I concluded that: “Bottom Line: ‘No PBA’ is not a wise choice for enterprises Microsoft’s reasoning that you don’t need PBA because the known memory attacks are difficult to pull off on most modern hardware... The post “Extracting BitLocker keys from a TPM” appeared first on SecureSpeak | WinMagic Data Security Blog. […]