Cybersecurity News in Asia
With just US$1,000, you can buy stolen credentials on Russia...
By L L Seow | Jan 16, 2023
In the continuing cyber arms race, AI and ML are hackers’ be...
By L L Seow | Dec 13, 2022
Putting people and identity at the center of cloud security ...
By Victor Ng | Dec 12, 2022
SECURITY NEWS
Adversaries are getting way smarter than official app stores
Feb 3, 2023
The CryptoRom scam ring has broken through the app stores’ security review processes, and more bypasses can be expected in future
EXPERT OPINIONS
Strengthening Singapore’s food security with technology
Jan 18, 2023
With less than 1% of its already scarce land designated for agri-food industries, how can Singapore leverage digital transformation to produce 30% of its food supply by 2030?
TIPS
Towards a passwordless Internet for safer online experiences — even for seniors
Feb 7, 2023
The silver generation is key target of scammers, so biometrics and other passwordless identity authentication features can really help here…
CLOUD SECURITY
Putting people and identity at the center of cloud security and strategy
Dec 12, 2022
In response to findings from its 2022 survey, HashiCorp delivers zero trust remote access delivered in the cloud, and no-code provisioning to address infrastructure-as-code skills gap
Cybersecurity: looking back 2021, looking ahead 2022
Jan 20, 2022
Ransomware attacks & enterprise response in APAC
Jul 29, 2021
Track an Attack on Critical Infrastructure
Jun 28, 2021
INFOGRAPHICS
Usher in the Year of the Rabbit, not the Phish!
Jan 17, 2023
Fish may be a symbol of prosperity, but phishing isn't...
Cyber Intelligence
LatestMaking cyber-resilience part of your organization’s balance sheet
By Victor Ng | Apr 26, 2022
People are central to an organization – and to its cybersecurity and balance sheet.
-
-
Lapsus$ strike$ again$t Samsung
By CybersecAsia editors | Mar 10, 2022
-
Ransomware – a growing enterprise threat
By CrowdStrike | Sep 22, 2021
Cyber Warfare
LatestRansomware still the #1 cyber threat: report
By CybersecAsia editors | Jan 30, 2023
With stolen credentials and Ransomware-as-a-Service kits being sold cheaper than ever on the Dark Web, expect more cybercrime this year!
-
-
Ukraine-Russia conflict: war also occurs in cyberspace
By CybersecAsia editors | Feb 28, 2022
-
MOST READ
How to steal a keyless-entry car in 5 steps
You will need a python, a blue tooth, and a raspberry pie … among other handy gadget thingeys.
The future of digital identities and digital trust
In the digital economy, businesses and individuals need digital trust – by ensuring portable and verifiable digital identities and credentials, while protecting privacy.
Join 60,000 Fellow IT & Business Professionals in APAC Region
Get the latest news, trends and expert opinions straight to your inbox, and craft an effective cybersecurity strategy.
Voters-draw
Gamification listing
PARTICIPATE NOW |
|
Vote Now -Placment
BB HTC
Top-Sidebar-banner
Whitepapers
eBook: Ransomware Deception Use Cases
Learn how Metallic ® ThreatWiseTM , from Commvault, can provide proactive and advanced data protectionDownload WhitepaperPost-Pandemic APAC Digital Transformation and OT Cyber Security
All you need to know about digital transformation and OT cybersecurity in Asia in the …Download WhitepaperFour Things to Consider to Successfully and Securely Run Critical Applications in the Cloud
Use this checklist to securely and successfully run critical applications in the cloud and maximize …Download WhitepaperCriteria Guide When Choosing An Endpoint Detection and Response (EDR) Solution
Use this checklist to make a more informed decision when choosing an endpoint detection and …Download Whitepaper
Middle-sidebar-banner
Case Studies
Grace implements Check Point solutions for comprehensive protection
A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read moreMaxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead moreCase Study: Metallic ® ThreatWiseTM Data Protection Use Cases
How Metallic ThreatWise helped customers across industriesRead more