Thursday May 09th

Facebook policy change: dealing with the choice of timeline vs apps
Facebook‘s new and extremely important change to its policies now allows businesses to run contests and administer promotions on their Facebook pages instead of having to use apps.
Read more...
Lumension Endpoint Security outperforms traditional antivirus according to industry test
In a recent test by the Tolly Group, an independent evaluation and certification provider for IT products and services, Lumension Endpoint Management and Security Suite (L.E.M.S.S.) outperformed traditional antivirus programs in both the system-level impact and amount of malware detected. L.E.M.S.S. ...
Read more...
Glipho makes social blogging easy
Social blogging is a leading web activity, yet most writers struggle to build an audience for their posts. Glipho.com is tackling this issue by combining a publishing platform with a social environment that can help international writers expand their reach.
Read more...
Steps towards a culture of security
The Internet is an unsafe medium and actually a dangerous place. Due to the euphoria about all the possibilities of global data exchange, the abuse potential it implies was recognized but not really considered relevant for a long time. Systems have been built on the confidence that nothing would eve ...
Read more...
TO THE NEW further expands in South East Asia with acquisition of Singapore based ThoughtBuzz
Continuing its aggressive expansion in South East Asia, TO THE NEW, a leading digital services network, announced the acquisition of Singapore‐based ThoughtBuzz, a leading social media analytics company in South East Asia, just this week. This acquisition will allow TO THE NEW to strengthen its se ...
Read more...
Privacy by default considered by a number of data protection authorities
“Privacy by Default” is a software design concept that intends to prohibit the collection, display, or sharing of any personal data without explicit consent from the customer. More detailed definitions often include a requirement that privacy settings should be turned on by default to limit the ...
Read more...
Social publishing: understanding the value drivers and calculating ROI
According to the eBook How to Calculate the ROI of Social Publishing by Salesforce Marketing Cloud, it is possible to directly attribute revenue and cost savings back to social media campaigns - in publishing, listening, and advertising. Enjoy the summary.
Read more...
The 7 foundational principles of privacy by design
Dr. Ann Cavoukian, Information and Privacy Commissioner of Ontario, Canada, provides extremely informative insights on Privacy by Design on her website. The objectives of Privacy by Design — ensuring privacy and gaining personal control over one’s information and, for organizations, gaining ...
Read more...
Announcements & appointments
Recognised marketer, Hélène Blanchette, senior manager of Innovation & Business Transformation, Fuji Xerox Asia Pacific Pte Ltd, known for her renowned 1:1 experience programme that has helped customers generate increased ROI efficiency, was conferred the title of one of Asia’s Top 50 CMOs at th ...
Read more...
The pros and cons of anonymity: how to make social media integration privacy compliant
Discussions on privacy or surveillance on the Internet are hotly debated these days, often thumping the right to remain anonymous. Just look at the recent disclosures by Edward Snowden that triggered the whole NSA dilemma and confronted people with the new reality of surveillance by states quite pla ...
Read more...
Mobile Marketing Academy brings intensive mobile training to Asia-Pacific marketers
As the Asia Pacific region is expected to fuel the growth of mobile marketing in the world, the spotlight is on the region’s marketers and how they can deliver on this stage. Home to the next billion of mobile users, the potential is ripe, but strategy needs to keep up to speed with the opportunit ...
Read more...
Prolexic publishes media guide to counter DDoS cyberthreats
Prolexic just released its brand new "Distributed Denial of Service (DDoS) Media Guide", we‘d like to give you an overview of. According to Prolexic, DDoS attacks have become one of the most common and destructive forms of online hacking, and these malicious attempts to take down websites continue ...
Read more...
Moontoast’s ultimate industry guide to social rich media advertising
Social advertising will continue its strong momentum as innovations in the field are poised to double annual revenues from $4.6 billion in 2012 to $9.2 billion by 2016, states independent market research firm BIA/ Kelsey. Despite the enormous potential of social advertising, there is still surprisin ...
Read more...
McAfee report warns of sms-stealing banking malware and data-stealing apps
Each quarter, the McAfee Lab team, consisting of 500 multidisciplinary researchers from 30 countries, is following threats in real time, identifying application vulnerabilities, analyzing and correlating risks, and enabling instant remediation to protect enterprises and the public. The wholly owned ...
Read more...
eMags 2013
January 2013 February 2013 March 2013 April 2013 May 2013 June 2013  Digital Marketing Trends 2013  Multichannel Marketing  Social Media Platforms, Tools & Operative Approaches  Video, Streaming, IPTV-Marketing & WebTV- Platforms Target ...
Read more...
Data privacy trends in Asia Pacific‘s highly fragmented legislative environment
Forrester‘s senior analyst, Masami Kashiwagi, has been researching data privacy laws in Asia Pacific (AP) and spoke to a wealth of different professionals across all kinds of industries, in order to understand the ever-evolving data privacy regulations and policies across 15 different jurisdiction ...
Read more...
Exclusive interview: cybercrime and security measures from an Asian perspective
Asian eMarketing had the opportunity to interview Wahab Yusoff, Vice President of McAfee South Asia, regarding security aspects specific for Asia. With over 26 years of experience in the IT industry serving in various capacities and management roles, Wahab has operated mostly in the Asia Pacific reg ...
Read more...
Your 8 step defense strategy to protect your system against targeted attacks
According to Trustwave‘s 22 page eBook „Inside a Hacker‘s Playbook: 10 Targeted Techniques that will break your Security“, concerted attacks are successful because they are stealthy, specific and disarmingly personal. Advanced attackers can quietly infiltrate a network and steal data or info ...
Read more...
Privacy is a 2-way road
Privacy is the right to be left alone, or how would you describe it in a few words? It is the freedom to decide whether you want to communicate, what you want to communicate and with whom.
Read more...
Secure exchange of data is the cornerstone of the Shareconomy
"Shareconomy" describes the sharing and collective use of information that can lead to increased transparency within a company by providing a broader access to content such as analyses, proposals or customer reports. Besides, it can save time, while boosting efficiency, and enhance the emergence of ...
Read more...
Increasing android malware points out cybercrime’s intricacy
According to eMarketer’s latest forecast, mobile is making inroads in digital ad spending throughout the world and mobile internet ad spending is growing in each and every region. Overall the company predicts that a greater share of all digital dollars will go towards mobile each year, claiming th ...
Read more...
Hotspot security?! Don‘t give cybercriminals the hotspot opportunity!
Mobile surfing has become cheaper, since data roaming prices have fallen. However, if you want to use your smartphone, tablet computer or notebook on vacation, and want to download or send large amounts of data, or make use of video telephony, you can do that at low cost via public Wi-Fi hotspots. S ...
Read more...
Gartner: big data, gamification and 3D printing hype reached its peak
Gartner published just recently its new outlook "Hype Cycle for Emerging Technologies”, in which it states that the expectations of Big Data will shift in the near future to a more realistic view. In five to ten years, the firm believes, big data will then reach the "Plateau of Productivity" and l ...
Read more...
If cybercriminals have a business model, CISOs need one too!
According to Forrester’s 2012 report „Determine The Business Value of an Effective Security Program - Information Security Economics 101“, it is almost impossible for chief information security officers (CISOs) to meet all of the modern organization’s security demands. CISO are evaluated not ...
Read more...
Novell‘s protection suite provides security management, disk encryption and patch management for endpoints
BYOD, mobility, multiple screens, the cloud, file-sharing ... the endless possibilities of cyberspace in today’s technologically fragmented working environment is leaving CISOs with a ton of ever-changing challenges, and cybercriminals with too many opportunities.
Read more...
Beware of free gifts and tricks to steal your Facebook data
There is no doubt that online spying and hacking are becoming a bigger problem each day. But especially Facebook accounts are threatened in a way users can not even imagine, as clicking on a simple link could lead to all the data getting stolen.
Read more...
Trustwave and TNS join forces to protect payment card data with POS encryption service
Last week Trustwave and Transaction Network Services, Inc. (TNS) announced that they joined forces to offer an open and vendor agnostic point-to-point encryption service, designed to help merchants protect their customers’ payment card information.
Read more...
Security maintenance measures to protect your website against malicious cybercrime attacks
Ordering a bikini or summer dress last minute online, or booking a hotel room quickly, whatever you do in cyberspace, be aware that malware can catch you.
Read more...
VMware unveils next-generation network virtualization platform with built-in security model
VMware launched this week a range of new products, one of which is VMware NSX™, a Network Virtualization Platform that comes with a new network operational model that improves agility, advances data center economics and goes hand-in-hand with security measures.
Read more...
Aspects of IT security
IT security is a necessary precondition for the operational use of information systems and informational self-determination. Unfortunately, the actual relevance of IT security is often only recognized when absent. Although the industry is continuously working hard to make the Internet more secure fo ...
Read more...

Q1 2024 on new website

LATEST EMAGS

VMWare APAC

About Us

MediaBUZZ is the first ‘pure’ digital publisher in the region, making an impact in Asia Pacific since 2004. Designed to empower marketers in the vibrant, ever-changing electronic marketing environment, its publication Asian eMarketing covers the digital age and zooms in on the most valuable and indispensable tools of today’s marketers. Circulated weekly to more than 60,000 top management and marketing decision-makers, the useful and informative articles support e-marketers in finding a sound marketing strategy, vital for their growing business success.

Contact Us

MediaBUZZ Pte Ltd

Reg. No. 200407301C

Phone: +65 6836 1807

Fax: +65 6235 1706

General Contact: info[at]mediabuzz.com.sg