Spy vs spy: battling the unseen global persistent ...
By Carlo Cordova | Aug 30, 2021 | Cyber Warfare, Features | 0
Understanding Myanmar’s intensifying digital disru...
By CybersecAsia editors | Apr 7, 2021 | Cyber Warfare, News, Newsletter | 0
Cyber Murder Mystery
By Check Point Software Technologies | May 21, 2020 | Cyber Espionage, Cyber Warfare, Cyber-forensics, Cyber-terrorism, Video | 0
Ukraine-Russia conflict: war also occurs in cyberspace
By CybersecAsia editors | Feb 28, 2022 | Cyber Warfare, News, Newsletter
One threat intelligence firm confirms that pro-Russian ransomware and phishing groups have stepped up efforts against Ukrainian military personnel and civilians.
Read MoreSpy vs spy: battling the unseen global persistent threats of US-China tensions
By Carlo Cordova | Aug 30, 2021 | Cyber Warfare, Features
Beneath the veneer of global APT attacks lies a complex crossfire of political enmity, perfidy and cyber greed. Manchurian candidates, anyone?
Read MoreUnderstanding Myanmar’s intensifying digital disruptions
By CybersecAsia editors | Apr 7, 2021 | Cyber Warfare, News, Newsletter
The citizenry is resorting to VPN and privacy-centric apps to beat the junta’s censorship and digital blackouts, according to one report.
Read MoreCyber Murder Mystery
By Check Point Software Technologies | May 21, 2020 | Cyber Espionage, Cyber Warfare, Cyber-forensics, Cyber-terrorism, Video
If there was a hack, then there was a hacker – cyber threat analysis is a detective’s job, like an Agatha Christie novel. See how Check Point...
Read MoreCyber-defending our national airspace
By Victor Ng | Jan 15, 2020 | Cyber Warfare, Features
Warfare has moved from the physical world to the cyberworld, and from airspace to cyberspace. A huge amount of data is processed with each flight or...
Read More2019 was a glorious year for malicious actors
By CybersecAsia editors | Dec 3, 2019 | Cyber Espionage, Cyber Warfare, Cyberthreat Landscape, Features
A report on high-tech crime trends shows up 2019’s alarming growth of state-sponsored threats and other innovative attack vectors coming our way....
Read MoreSecuring the world’s critical public services, multiple cities at a time
By L L Seow | Nov 19, 2019 | Cyber Warfare, Cybersecurity Strategies, Features
Ever heard of the GRF or OT-ISAC? They crowdsource security intelligence that could well save our lives during synchronized cyberattacks! In...
Read MoreGroup-IB’s CyberCrimeCon event makes full-fledged debut in Singapore
By CybersecAsia editors | Nov 19, 2019 | Cyber Espionage, Cyber Warfare, News, Sponsored
Group-IB is bringing its signature event CyberCrimeCon to Singapore. Group-IB’s CyberCrimeCon is a global Threat Hunting & Intelligence...
Read MorePKPLUG: Chinese cyber-espionage group targeting Asia
By CybersecAsia editors | Oct 21, 2019 | Cyber Espionage, Cyber Warfare, News
Palo Alto Networks’ threat intelligence arm Unit 42 has released a report detailing the movements of PKPLUG, a previously unnamed Chinese...
Read MoreFireeye and the Cyber Security Agency of Singapore look to expand strategic partnership
By CybersecAsia editors | Oct 14, 2019 | Cyber Warfare, Data Protection, Information Security, News
International cybersecurity company aims to strengthen Singapore’s cyber security ecosystem through continued capability development and threat...
Read MoreCyberwar: Why not prevention?
By Edwin Doyle, Global Security Strategist, Check Point Software Technologies | Oct 5, 2019 | Cyber Warfare, Opinions
What should we do when breaches are no longer a laughing matter? Let’s reminisce about the good old days. Remember when simple computer viruses...
Read MoreFrom securing devices to securing nations
By Sharat Sinha, Vice President/GM, APAC, Check Point Software Technologies | Sep 25, 2019 | Cyber Warfare, Opinions
As the Internet evolved rapidly with accelerated adoption, cybersecurity became increasingly a challenge to grapple with. While commercial Internet...
Read MoreSuggested measures for national cyber defense
By Sanjay Aurora, Managing Director, Asia Pacific, Darktrace | Sep 17, 2019 | Cyber Warfare, Opinions
Some lessons that the Singapore government’s Public Sector Data Security Review Committee can learn from the private sector and other governments....
Read MoreTokyo 2020: Olympics with all the smarts
By L L Seow and Victor Ng | Aug 27, 2019 | Cyber Warfare, Cyber-terrorism, Features
As the Olympic Games 2020 approaches, Tokyo wants to demonstrate its cyber mettle to the world. But what about cybersecurity? When Tokyo hosts the...
Read MoreKnow Thy Enemy: understanding the cybercriminal psyche
By L L Seow | Aug 23, 2019 | Cyber Intelligence, Cyber Warfare, Features
Attackers are constantly evolving their tools and their game, but knowing their base instincts helps us defend against them.
Read More
Gamification listing
PARTICIPATE NOW |
|
sponsors-RCA

Whitepapers
Whitepaper: IT and OT Infrastructure Cybersecurity Threats
Industrial cybersecurity threats that can bring down critical infrastructuresDownload WhitepaperSecurity Challenges of Work-From-Anywhere
Work-from-anywhere enterprise security challenges and solutionsDownload WhitepaperStruggling to Securely Keep Up with Digital Acceleration
Digital acceleration is posing security challenges and solutions for enterprisesDownload Whitepaper2021 Human Factor Report
How ransomware, email threats, and other threat actors evolved and the latest techniques used in …Download Whitepaper
News
Case Studies
Retail wealth management firm taps API technology for secure personalized outreach
A wealthtech firm managed to handle the deluge of panic enquiries at the beginning of …Read moreStock exchange reaches for the Cloud to meet compliance, agility targets
Improving data management automation, data-driven services and regulatory compliance levels sets the pace for India’s …Read moreTransport industry a major cyber target: Indonesia acts to ramp up defenses
The country’s largest taxi operator turns to AI-driven cybersecurity upgrades to protect its critical national …Read morePhilippines payment platform hardens cloud application security infrastructure
This includes rooting out vulnerabilities in container images and serverless functions, cloud misconfigurations, and hidden …Read more