Press and Media

Back to Parenty Consulting Group Home

Retailers need to focus holistically on Cybersecurity
FBIC Global Retail Research & Intelligence
November 20, 2014

Chinese cyber attacks on West are widespread, experts say
February 1, 2013

Chinese Authorities Putting Pressure on Businesses to Help Censor the Web
The New York Times
November 13, 2012

QBPC Warns Members About Risk of China-Mandated Software
August 28, 2012

International firms caught in China’s security Web
August 24, 2012

The Cyber Scare
Insight: The Journal of the American Chamber of Commerce in Shanghai
June 4, 2012

Wannabe infosec kingpins: Forget tech, grab a clipboard
The Register
April 25, 2012

“Analysis: The hidden cost of cybercrime”
June 7, 2011

Gmail attack shows growing cybercrime sophistication
June 2, 2011

How to Have World Class Data Management
Fashion Technology Magazine
March/April 2010

Avoid being victimized in Internet scam
TVB: Money Magazine
March 26, 2010

How safe is cloud computing?
March 12, 2010

Confab vets data security
Viet Nam News
December 12, 2009

US testing new system to bypass web filters
China Daily
August 15, 2009

China: Filtering software will not be required
August 14, 2009

Cyber attacks touching celebrities, governments
July 10, 2009

China’s ‘Green Dam’ unleashes flood of business complaints
July 1, 2009

Dollars and sense
Computerworld Hong Kong
March 11, 2009

Does your business have the stomach for risk?
Computerworld Hong Kong
June 5, 2008

The past may come back to haunt you
South China Morning Post
April 29, 2008

Plugging the holes
April 2, 2008

Strengthening Security Awareness and Deployment
Vietnam Business Forum
March 11, 2008

Companies More At Risk from Internal Attacks
South China Morning Post
September 25, 2007

Internet censorship gathers steam
April 24, 2007

Homework: Realities of a remote workforce part 1
HR Hong Kong
February 2007

Gangs Flooding the Web for prey, analysts say
December 20, 2006

Rethinking Your Computer Security Systems
Tradelink e-Biz
December 2006

HSBC reassures on security flaw
South China Morning Post
August 12, 2006

Security Summit
Computerworld Hong Kong
October 1, 2005

The leaky corporation
The Economist
June 25, 2005

Staying Connected…Safely
BusinessForum China
March/April 2005
(Download Article)

Good habits may offer best defense
South China Morning Post
March 22, 2005

Moving Target
Asian Wall Street Journal
February 25 -27, 2005

ID card numbers not secure passwords
South China Morning Post
June 8, 2004

IT Security: What The Experts Say
Far Eastern Economic Review
April 22, 2004

Strategic Imperatives – Security Gets A Business Framework
Microsoft Executive Circle
Summer 2004

Cyber-Security Enters Boardroom
December 10, 2003

Information Security: Beyond Firewalls
Optimize, Business Strategy & Execution for CIOs
December 1, 2003

Digital Defense: Establishing Identity
November 25, 2003

Are You A Technical Guru Or An Enlightened Friend?
Ubiquity, An ACM IT Magazine and Forum
November 5, 2003

Of Security, And Change
The Hindu Business Line
October 29, 2003

Required Reading
October 23, 2003

New Rules For Information Security
Harvard Business School Working Knowledge
October 20, 2003

Digital Defense
IT Conversations
October 8, 2003

A New Approach To Information Security
UNISYS Exec online
October 2003

Who Are You? And How Do I Know You Are Who You Say You Are? Learning To Rely On Digital Identity
October 2003

Stopping The Flow:
It’s Easier To Keep Hackers Out Of Corporate Computers Than To Keep Data In

CFO Magazine
September 1,2003

Asia Travel Scare: Worries About The Spread Of Mystery
Illness Prompt Firms To Curtail Business Overseas

San Francisco Chronicle
April 2, 2003

Not As Secure As You Think
Sybase Magazine
First Quarter 2003

Strong Cryptography, The Global Tide Of Change
CATO Institute Briefing Papers
September 17, 1999

The latest encryption bills still won’t bring the
United States up to international standards

Red Herring Magazine
September 1999

Encryption experts cheer introduction of SAFE Act
The Freedom Forum Online
March 8, 1999

Administration Attacks Encryption Bill
PC World News
March 4, 1999

Industry takes crypto to the Hill
March 4, 1999

The $237 Billion Conundrum
Electronic Business
November 1998


Biblioteques de la UPC. Unitat de Suport en Informacio Electronica
15 Octubre 1998

Telecom users need education
The National
Port Moresby, Papua New Guinea
September 8, 1998

Encryption And You
June 29, 1998

Encryption exports not easy
April 6, 1998

Securing the Net
Computerworld New Zealand
March 16, 1998

Senate Hearing on Encryption Could Stir Up Constitutional Debate
Dow Jones Online News
March 13, 1998

Partisans on Both Sides Await Senate Hearing on Encryption
The Wall Street Journal Interactive Edition
March 13, 1998

Commercial Perspectives on Information Assurance Research
Report to the President’s Commission on Critical Infrastructure Protection
October 1997

Online Update
The American Spectator
September 23 – 29, 1997

In Dispute: Access Rights To Coded Messages
Computer News Daily
The New York Times Syndicate
September 5, 1997

Industry blast domestic key-escrow proposal
September 4, 1997

Encryption Ruling Won’t Help Exports
San Francisco Chronicle
August 27, 1997

Encryption Gyrations
Software Magazine
August 1997

It’s Only The Beginning
Financial Service ONLINE
July/August 1997

Decoding The Real Meaning Behind The New Encryption Policy
Financial Service ONLINE
June 1997

SAFE Meets More Opposition
The Export Practitione
June 1997

Privacy: ‘First Holy War of the Information Age’
Computer News Daily
NY Times News Service
May 27, 1997

Battle Over Internet Privacy Heats Up On Capitol Hill
NY Times News Service
May 25, 1997

Sybase Gets Government Waiver for Encryption Software Exports
May 21, 1997

Sybase crypto OK for export
May 21, 1997

Daily Report for Executives
May 20, 1997

Goodlatte takes lead role in taming of cyberspace
The Roanoke Times
April 21, 1997

Banks May Be Forced To Give Up The Keys To Their Internet Gateway
Report on Home Banking & Financial Services
April 15, 1997

US encryption export rule critics blast proposal
March 26, 1997

Hot Connections — Secure edges Check Point’s Interne
firewalls, but Alta Vista sells best

March 1, 1997

Computer Crime Adds Fuel To Firewall Market
Inter@ctive Week
February 24, 1997

Security: It’s Your Call
December 9, 1996

Web security threat grows
Electronic Engineering Times
November 4, 1996

Is Terrorism the Net’s Fault?
November 1, 1996

Planning Your Intranet
The Washington Post
September 30, 1996

Channel feels pinch of export limitations — VARs Hit Encryption Roadblock
Computer Reseller News
August 5, 1996

Critics Claim US Encryption Policies Inefficient, Self-Serving
July 29, 1996

Computer Industry Off-line with US Encryption Control
Morning Edition, National Public Radio
July 5, 1996

Silicon Valley Fights Limits on Exporting Encryption Software
The Christian Science Monitor
July 5, 1996

The Third World War Will Be An Information War
IDG News Service
July 1996

The Rush to the Net
Data Based Advisor
May 1996

New Proposals on Encryption get Tepid Response
The Wall Street Journal
February 26, 1996

The Proxy’s Price
LAN Times
February 19, 1996

Encryption Exports Could Hurt US Software Market
Electronic Messaging News
November 29, 1995

Sybase Sites to Get Web Links
Communications Week
November 13, 1995

IFIP WG11.3 Conference on Database Security
Electronic CIPHER
November 1, 1995

Is Your LAN Data Secure?
Software Magazine
May 1992

Sybase Shipping a ‘Secure’ RDBMS
UNIX Today
March 5, 1990

Sybase Unveils Multilevel Secure DBMS
Federal Computer Week
February 19, 1990

Integration Issues for Multilevel Systems
Data Security Digest, Emmeloord, The Netherlands
Volume II, #3, 1990

Placing trust in UNIX
Systems Integration
September 1989

Secure DBMS Companies on Hold Pending NCSC Revision of Guide
Federal Computer Week
August 14, 1989

Secure UNIX Standards Heat Up
Data Security Letter
December 1988

Back to Parenty Consulting Group Home