Embracing a password-less future
By Victor Ng | Jun 25, 2020 | Cybersecurity Strategies, Features, Identity Theft & Online Fraud | 0
Securing the world’s critical public services, mul...
By L L Seow | Nov 19, 2019 | Cyber Warfare, Cybersecurity Strategies, Features | 0
Securing 5G and IoT: software-defined zero-trust
By L L Seow and Victor Ng | Aug 30, 2019 | Cloud Security, Cybersecurity Strategies, Features, Mobile Security | 0
2020 Open Source Security and Risk Analysis report
By Synopsys | Feb 16, 2021 | Cybersecurity Strategies, Sponsored, Whitepapers
Here’s your personal copy of one of the industry’s most important analysis report.
Read MoreEmbracing a password-less future
By Victor Ng | Jun 25, 2020 | Cybersecurity Strategies, Features, Identity Theft & Online Fraud
We all know how insufficient passwords are, but what are the alternatives? The username/password model has been around for some time now. But in...
Read MoreSecuring the world’s critical public services, multiple cities at a time
By L L Seow | Nov 19, 2019 | Cyber Warfare, Cybersecurity Strategies, Features
Ever heard of the GRF or OT-ISAC? They crowdsource security intelligence that could well save our lives during synchronized cyberattacks! In...
Read MoreSecuring 5G and IoT: software-defined zero-trust
By L L Seow and Victor Ng | Aug 30, 2019 | Cloud Security, Cybersecurity Strategies, Features, Mobile Security
High speed wireless connections and devices are redefining the digital landscape, and the zero-trust cybersecurity paradigm must keep up. The...
Read MoreInadequate education, leadership and funding major barriers to cybersecurity
By CybersecAsia editors | Aug 22, 2019 | Cybersecurity Strategies, Cyberthreat Landscape, Features, News, Risk Management, Security Awareness & Education
Comprehensive study of 900 business decision makers across Asia Pacific and Japan revealed corporate culture and employee education’s role in...
Read MoreThink and act like a hacker to protect your company’s assets
By RSA Conference | Aug 22, 2019 | Cyber Intelligence, Cybersecurity Strategies, Video
Featuring Paula Januszkiewicz, CEO, CQURE: The reality here is as follows: attacks happen and they will happen as long as there are humans on this...
Read MoreThe five most dangerous new attack techniques and how to counter them
By RSA Conference | Aug 22, 2019 | Cybersecurity Strategies, Cyberthreat Landscape, Security Awareness & Education, Security Trends & Developments, Video
Featuring: Nick Klein, Director of Klein & Co. Computer Forensics, SANS Certified InstructorRobert M. Lee, CEO and Founder, Dragos, Inc., SANS...
Read MoreExecutive Guide: NTT Global Threat Intelligence Report 2019
By CybersecAsia editors | Jul 5, 2019 | Cloud Security, Cyber Intelligence, Cybersecurity Strategies, Cyberthreat Landscape, Whitepapers
For several years, Dimension Data has published an Executive Guide to the NTT Security Global Threat Intelligence Report, providing insights and analysis from its cybersecurity experts about the shifting threat...
Read More
Voters-draw
Thales Gamification
Gamification listing
PARTICIPATE NOW |
|
Vote Now -Placment
BB HTC
Top-Sidebar-banner
Whitepapers
Post-Pandemic APAC Digital Transformation and OT Cyber Security
All you need to know about digital transformation and OT cybersecurity in Asia in the …Download WhitepaperFour Things to Consider to Successfully and Securely Run Critical Applications in the Cloud
Use this checklist to securely and successfully run critical applications in the cloud and maximize …Download WhitepaperCriteria Guide When Choosing An Endpoint Detection and Response (EDR) Solution
Use this checklist to make a more informed decision when choosing an endpoint detection and …Download WhitepaperCyber Threat Predictions for 2023 by FortiGuard Labs
Learn the cyber threat predictions in 2023 in this annual perspective by FortiGuard Labs.Download Whitepaper
Middle-sidebar-banner
Case Studies
Maxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead moreFortinet Security Fabric Protects Yedpay’s New Cloud Environment
Yedpay Power Its Business Growth with Fortinet Security FabricRead moreCase Studies: 1.5 million lessons from the SingHealth hack
Learn the lessons from this post-mortem of a healthcare information hackRead more