Cybersecurity News in Asia
On World Backup Day, rethink your data protection strategy
By Soham Sengupta | Mar 28, 2023
Impact of AI in an era of disinformation threats
By Victor Ng | Mar 20, 2023
Identity management critical for IoT security
By Victor Ng | Mar 14, 2023
How organizations in APAC should approach cyber risks
By Victor Ng | Mar 7, 2023
SECURITY NEWS
Fake search engine ads being used in the region to distribute RATs
Mar 27, 2023
To snare Chinese-language web users, cybercriminals used ads linking to spoofed websites of popular software to spread a remote access trojan
EXPERT OPINIONS
Geopolitical instability and economic uncertainty – a perfect storm for cybercriminals
Feb 17, 2023
International intelligence and collaboration more and more clearly obvious the key to managing cybersecurity risks
TIPS
On World Backup Day, rethink your data protection strategy
Mar 28, 2023
Implementing a secure and cost-effective data backup strategy can go a long way in mitigating the damage caused by cyberattacks
-
-
-
Using AI to detect phishing: how does it work?
Mar 21, 2023
CLOUD SECURITY
With more concern over cloud security, too many tools could be counterproductive
Mar 14, 2023
While increased cloud adoption and awareness of cloud-specific security issues are a good thing, tools sprawl was a dampener: survey
Cybersecurity: looking back 2021, looking ahead 2022
Jan 20, 2022
Ransomware attacks & enterprise response in APAC
Jul 29, 2021
Track an Attack on Critical Infrastructure
Jun 28, 2021
INFOGRAPHICS
Top Application Security Trends in 2022
Mar 28, 2023
List of the top AppSec trends and interesting new innovations in 2022.
-
Know your adversaries
Mar 2, 2023
Cyber Intelligence
LatestGeopolitical instability and economic uncertainty – a perfect storm for cybercriminals
By John Fokker, Head of Threat Intelligence, Trellix | Feb 17, 2023
International intelligence and collaboration more and more clearly obvious the key to managing cybersecurity risks
-
-
Making cyber-resilience part of your organization’s balance sheet
By Victor Ng | Apr 26, 2022
-
Cyber Warfare
LatestRansomware still the #1 cyber threat: report
By CybersecAsia editors | Jan 30, 2023
With stolen credentials and Ransomware-as-a-Service kits being sold cheaper than ever on the Dark Web, expect more cybercrime this year!
-
-
Ukraine-Russia conflict: war also occurs in cyberspace
By CybersecAsia editors | Feb 28, 2022
-
MOST READ
eBook: Ransomware Deception Use Cases
Learn how Metallic ® ThreatWiseTM , from Commvault, can provide proactive and advanced data protection
2022 was a landmark year of cyber incidents: make 2023 better!
Read on to get an overview of major 2022 cyberattacks and learn from them to harden cybersecurity postures this year.
Join 60,000 Fellow IT & Business Professionals in APAC Region
Get the latest news, trends and expert opinions straight to your inbox, and craft an effective cybersecurity strategy.
Voters-draw
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
BB HTC
Middle-sidebar-banner
Whitepapers
A SANS Survey: Rethinking the Sec in DevSecOps: Security as Code
List of the top AppSec trends and interesting new innovations in 2022.Download WhitepaperDevelopers Guide: Top 10 OWASP API Security Issues
A developer’s technical guide to the top 10 Open Web Application Security Project (OWASP) API …Download WhitepaperConversational Microsoft 365 Data Backup
All you need to know about conversation Microsoft 365 data backup and recoveryDownload WhitepaperThe Global Enterprise Authentication Practices
Learn the global enterprise authentication practices in this Yubico survey research in partnership with Censuswide.Download Whitepaper
Case Studies
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & Access Management
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & …Read moreGrace implements Check Point solutions for comprehensive protection
A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read moreMaxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead more