Application security – from code to cloud
By Victor Ng | Sep 12, 2022 | Cloud Security, Features, Software Development Lifecycle Security | 0
How prepared are you for the ransomcloud?
By Victor Ng | Jun 21, 2022 | Cloud Security, Features | 0
Putting people and identity at the center of cloud security and strategy
By Victor Ng | Dec 12, 2022 | Cloud Security, Features, Newsletter
In response to findings from its 2022 survey, HashiCorp delivers zero trust remote access delivered in the cloud, and no-code provisioning to address infrastructure-as-code skills gap
Read MoreKey repatriation: the first step in re-establishing cloud data digital sovereignty
By Brian Grant, CPL ANZ's Regional Director, Thales | Sep 30, 2022 | Cloud Security, Sponsored, Tips
Repatriation is the process of returning an asset, an item of symbolic value, or a person—voluntarily or forcibly—to its owner or their place of origin or citizenship.1
Read MoreApplication security – from code to cloud
By Victor Ng | Sep 12, 2022 | Cloud Security, Features, Software Development Lifecycle Security
From coding to cloud users, a developer-first approach to security could well be the best way to secure applications in the cloud-based digital economy.
Read MoreHow prepared are you for the ransomcloud?
By Victor Ng | Jun 21, 2022 | Cloud Security, Features
Cybercriminals are targeting the cloud as organizations move more data into the cloud.
Read MoreSecuring the future of work with a zero trust strategy
By Victor Ng | May 23, 2022 | Cloud Security, Features
With hybrid work firmly in place for most organizations in Asia Pacific, the dynamic and ever-evolving cyber-threat landscape poses some critical challenges.
Read MoreDatabase security concerns in the cloud
By Victor Ng | Nov 29, 2021 | Cloud Security, Data Protection, Features, Newsletter
Should your organization move your database to the cloud? How well can cloud security concerns be mitigated?
Read MoreTapping on the five pillars of the Zero Trust model
By Geoff Soon, Managing Director, South Asia, Snowflake | May 21, 2021 | Cloud Security, Data Protection, Newsletter, Tips
So goes the mantra: never trust, always verify; encrypt data; least privilege until more is justified; and surveil for abnormal behavior.
Read MoreFunding Societies adopts Cloud Native Security Platform (CNSP) for simplified cloud security
By CybersecAsia editors | May 11, 2021 | Case Study, Cloud Security, Newsletter
Since prevention is better than cure, the firm chose a cloud-native platform to gain customer trust in the nascent digital-banking sector.
Read MoreHong Kong and Thailand ranked top 10 in Cloud security incidents for H2 2020
By L L Seow | Apr 16, 2021 | Cloud Security, Cyberthreat Landscape, Features, Newsletter
With the SolarWinds debacle fresh in our minds, we review the dramatic upsurge of cyberattack sophistication and equally spectacular cyber-vulnerability.
Read MoreThe state of cybersecurity in ASEAN
By Palo Alto Networks | Jul 23, 2020 | Cloud Security, Whitepapers
Survey found that investments in cybersecurity are evolving with the volume and sophistication of cyberthreats.
Read MoreChoosing the right path in your data management journey
By Victor Ng | Jul 16, 2020 | Cloud Security, Data Protection, Features, Newsletter
As data proliferates in the cloud and on-premise, data breaches and regulatory compliance are proving to be burdensome – financially or otherwise....
Read MoreIndonesian bank taps into data cloud platform to boost analytics and security
By CybersecAsia editors | Jul 14, 2020 | Cloud Security, News, Newsletter
Keeping pace with rapidly-evolving customer demands and expectations requires near real-time data insights that data cloud technology can offer. In...
Read MoreMcAfee cloud adoption and risk report
By McAfee | May 29, 2020 | Cloud Security, Whitepapers
New study shows a significant increase in cyberattacks targeting cloud services as employees largely work from home. Based on data from more than 30 million McAfee MVISION Cloud users worldwide...
Read MoreCloud security begins and ends in the boardroom
By Myles Hosford, Head of Security Architecture, ASEAN, Amazon Web Services | Apr 21, 2020 | Cloud Security, Newsletter, Opinions
C-suite executives need to keep all ears to the ground in order to formulate and manage security and compliance well. Members of the C-suite are...
Read MoreHybrid cloud adoption in healthcare organizations: what matters most?
By CybersecAsia editors | Apr 13, 2020 | Cloud Security, News, Newsletter
A 2019 report on enterprise cloud adoption showed that healthcare sectors value security and compliance in their IT transformation strategies....
Read MoreAn immune system for cloud security
By Darktrace | Apr 8, 2020 | Case Study, Cloud Security
As organizations increase their digital capabilities across hybrid, multi-cloud and IoT environments, they’re faced with more areas to protect and control.
Read MoreCloud security concerns are shifting upwards: are you prepared for the change?
By Dr. Lee Hing Yan, Executive Vice President, APAC, Cloud Security Alliance | Mar 24, 2020 | Cloud Security, Newsletter, Opinions
Just as clouds in the sky are not static, neither are the urgent security concerns of Cloud computing, this expert says. The adoption of cloud...
Read MoreWorry-free endpoint protection for SMEs
By Singtel | Mar 10, 2020 | Cloud Security, Features, Sponsored
The rise of cloud computing and the ubiquity of mobile computing have combined to put SMEs at risk of security and data breaches, as endpoints widen...
Read MoreThe big questions surrounding cloud security
By Victor Ng | Feb 28, 2020 | Cloud Security, Features, Newsletter
Only 31% of organizations believe that protecting data in the cloud is their own responsibility, and just 32% have a security-first approach to...
Read MoreSecuring the new digital workplace with BlackBerry
By CybersecAsia editors | Feb 11, 2020 | Cloud Security, Mobile Security, News
ConvergeOne deploys new solution that combines secure access with continuous threat protection powered by AI. ConvergeOne, an IT services provider...
Read More
Voters-draw
Gamification listing
PARTICIPATE NOW |
|
Vote Now -Placment
BB HTC
News
Top-Sidebar-banner
Whitepapers
eBook: Ransomware Deception Use Cases
Learn how Metallic ® ThreatWiseTM , from Commvault, can provide proactive and advanced data protectionDownload WhitepaperPost-Pandemic APAC Digital Transformation and OT Cyber Security
All you need to know about digital transformation and OT cybersecurity in Asia in the …Download WhitepaperFour Things to Consider to Successfully and Securely Run Critical Applications in the Cloud
Use this checklist to securely and successfully run critical applications in the cloud and maximize …Download WhitepaperCriteria Guide When Choosing An Endpoint Detection and Response (EDR) Solution
Use this checklist to make a more informed decision when choosing an endpoint detection and …Download Whitepaper
More News
Middle-sidebar-banner
Case Studies
Grace implements Check Point solutions for comprehensive protection
A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read moreMaxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead moreCase Study: Metallic ® ThreatWiseTM Data Protection Use Cases
How Metallic ThreatWise helped customers across industriesRead more