Cybersecurity News in Asia
Generative AI and OT security
By CybersecAsia editors | Mar 15, 2024
Are existing crisis management strategies outdated?
By Joel Pinaroc | Mar 8, 2024
Safeguarding tomorrow’s digital transactions from frau...
By Victor Ng | Mar 5, 2024
Minimizing human error for better cybersecurity
By Victor Ng | Feb 16, 2024
SECURITY NEWS
Identity security woes now a thing of the past for Heng Leong Hang
Mar 18, 2024
The retail chain was grappling with numerous cyber risks in its IT infrastructure until it upgraded to Zero Trust identity security
EXPERT OPINIONS
2024 cybersecurity trends
Feb 15, 2024
With generative AI taking the world by storm in 2023, what can AI and smart automation mean for cybersecurity in 2024?
-
2024 cybersecurity predictions from Akamai leaders
Dec 13, 2023
-
Keeper Security CEO shares 2024 predictions
Nov 28, 2023
-
2024: A new era of cybercrime ahead
Nov 17, 2023
TIPS
Sprucing up cyber resilience in the financial services industry: four focal points
Mar 19, 2024
How can the highly-targeted financial services industry remain operational and resilience in a year of escalating state-sponsored threats and cyberattacks?
-
-
All the cyber world is a stage…
Mar 5, 2024
-
CLOUD SECURITY
Are cloud giants holding the world’s data captive?
Oct 2, 2023
One small commissioned global survey has noted that respondents who felt trapped, need to be liberated from perceived cloud-vendor lock-in.
INFOGRAPHICS
Cyber Intelligence
LatestW3LL-oiled machine: report uncovers covert BEC phishing empire targeting Microsoft 365
By CybersecAsia editors and webmaster webmaster | Sep 7, 2023
A new threat report “W3LL DONE: HIDDEN PHISHING ECOSYSTEM DRIVING BEC ATTACKS” has detailed the operations of W3LL, a threat actor behind a phishing empire that has remained largely unknown until now.
-
-
-
Making cyber-resilience part of your organization’s balance sheet
By Victor Ng | Apr 26, 2022
Cyber Warfare
LatestRansomware still the #1 cyber threat: report
By CybersecAsia editors | Jan 30, 2023
With stolen credentials and Ransomware-as-a-Service kits being sold cheaper than ever on the Dark Web, expect more cybercrime this year!
-
-
Ukraine-Russia conflict: war also occurs in cyberspace
By CybersecAsia editors and webmaster webmaster | Feb 28, 2022
-
MOST READ
WhatsApp group chat vulnerability hack thwarted
Researchers had discovered in August a group-chat flaw where a malicious message could crash WhatsApp group users’ devices. A vulnerability in WhatsApp was recently identified, that could allow a bad actor to deliver a...
Nine DevSecOps secret scanning tools to keep the bad guys at bay
With the secrets of over 2m corporations already leaked, it is time to mandate action to plug the preventable gaps
Voters-draw/RCA-Sponsors
CybersecAsia Voting Placement
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
Whitepapers
Secure Access Service Edge (SASE) Solutions for Today’s Work-From-Anywhere (WFA) Environment
Organizations are turning to Secure Access Service Edge (SASE) solutions for securing remote work environments, …Download WhitepaperIdentity Has Breached the Ecosystem
This whitepaper explores the dual nature of identity in cybersecurity, emphasizing its role in both …Download WhitepaperFortanix Buyers Guide for Modern Key Management and Data Security
This document underscores the pressing challenges in key management and data securityDownload WhitepaperFortanix Data Risk Management – Using Tokenization to Secure Your Data
In today's digital world, organizations prioritize data security. To protect sensitive information, they use tokenization, …Download Whitepaper
Middle-sidebar-banner
Case Studies
Identity security woes now a thing of the past for Heng Leong Hang
The retail chain was grappling with numerous cyber risks in its IT infrastructure until it …Read moreIndonesia’s cyber defense agency tackles Defender’s Dilemma with new initiatives
The country’s public sector will benefit from three pillars of training, intelligence and capacity-building schemes …Read moreSingAREN showcases what a national research community needs for cyber protection
With threat actors thirsting to steal international research data, what kind of cybersecurity platform can satisfy …Read moreIndian pharmaceutical firm futureproofs security with Check Point
Safeguarding research data and intellectual property requires a futureproofed security infrastructure.Read more