Filling cyber skills gaps increasingly a board-level priority: survey
By CybersecAsia editors | May 12, 2022 | Cybersecurity Training & Certification, News, Newsletter
Responses from 1,223 decision makers in 29 countries showed two major trends involving a growing urgency in training and talent management.
Read MoreBridging the enterprise cybersecurity gaps
By Victor Ng | Jan 7, 2020 | Cybersecurity Training & Certification, Features, Security Awareness & Education
The increasing sophistication of cybercrime and the skills gap needed to address it have made cybersecurity a key management concern. The challenges...
Read MoreHigh demand for training in data protection
By CybersecAsia editors | Dec 22, 2019 | Cybersecurity Training & Certification, Data Privacy, Data Protection, News
To cope with tightened data privacy laws around the world, more certification programs will be needed to produce skilled professionals. The increasing demand for data privacy, as well as the perpetual threat of data...
Read MoreNational University of Singapore empowers student ethical hackers to bolster cybersecurity
By CybersecAsia editors | Sep 7, 2019 | Cybersecurity Training & Certification, News, White, Black & Grey Hat Hackers
Students benefit from HackerOne’s training and expertise earning bounties while securing the university against security vulnerabilities. HackerOne...
Read MoreEthical hacking competition for cybersecurity talent development
By CybersecAsia editors | Sep 5, 2019 | Cybersecurity Training & Certification, News, White, Black & Grey Hat Hackers
Trend Micro’s global ‘capture the flag’ provided real-world ethical hacking experience in the most critical areas for stopping...
Read More
Voters-draw
Gamification listing
PARTICIPATE NOW |
|
Vote Now -Placment
BB HTC
News
Top-Sidebar-banner
Whitepapers
eBook: Ransomware Deception Use Cases
Learn how Metallic ® ThreatWiseTM , from Commvault, can provide proactive and advanced data protectionDownload WhitepaperPost-Pandemic APAC Digital Transformation and OT Cyber Security
All you need to know about digital transformation and OT cybersecurity in Asia in the …Download WhitepaperFour Things to Consider to Successfully and Securely Run Critical Applications in the Cloud
Use this checklist to securely and successfully run critical applications in the cloud and maximize …Download WhitepaperCriteria Guide When Choosing An Endpoint Detection and Response (EDR) Solution
Use this checklist to make a more informed decision when choosing an endpoint detection and …Download Whitepaper
More News
Middle-sidebar-banner
Case Studies
Grace implements Check Point solutions for comprehensive protection
A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read moreMaxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead moreCase Study: Metallic ® ThreatWiseTM Data Protection Use Cases
How Metallic ThreatWise helped customers across industriesRead more