Bridging the enterprise cybersecurity gaps
By Victor Ng | Jan 7, 2020 | Cybersecurity Training & Certification, Features, Security Awareness & Education
The increasing sophistication of cybercrime and the skills gap needed to address it have made cybersecurity a key management concern. The challenges...
Read MoreHigh demand for training in data protection
By CybersecAsia editors | Dec 22, 2019 | Cybersecurity Training & Certification, Data Privacy, Data Protection, News
To cope with tightened data privacy laws around the world, more certification programs will be needed to produce skilled professionals....
Read MoreNational University of Singapore empowers student ethical hackers to bolster cybersecurity
By CybersecAsia editors | Sep 7, 2019 | Cybersecurity Training & Certification, News, White, Black & Grey Hat Hackers
Students benefit from HackerOne’s training and expertise earning bounties while securing the university against security vulnerabilities. HackerOne...
Read MoreEthical hacking competition for cybersecurity talent development
By CybersecAsia editors | Sep 5, 2019 | Cybersecurity Training & Certification, News, White, Black & Grey Hat Hackers
Trend Micro’s global ‘capture the flag’ provided real-world ethical hacking experience in the most critical areas for stopping...
Read More

Whitepapers
Webinar: Best practices for critical event management
Join this on-demand presentation to learn how organizations are leveraging AtHoc to plan, prepare and …Download WhitepaperWebinar: Best practices for teleworkers at scale
Learn how your organization could more effectively provision network bandwidth, support and security for your …Download WhitepaperMaximize the ROI of detection and response
Cut costs by 44% by consolidating tools and streamlining operations for cyber-threat detection and response.Download WhitepaperHealthcare organization addresses cloud access management challenges
Healthcare and recruitment data are some of the most sensitive information, and need special protection …Download Whitepaper
More News
Case Studies
Are we ready for the next big breach?
How organizations across various industries prevent breaches, get deep visibility to detect and stop threats …Read moreIdaptive reduces complexity, increases security for NZ agricultural organization
Challenge: find a single sign-on solution to reduce complexity, minimize calls for password assistance, increase …Read moreEmail Security Threat Report 2020
Email and collaboration platforms are the connective tissue of most businesses and organizations, where information …Read moreLeading Malaysian developer zeroes in on threats with LogRhythm
Full visibility and intelligent detection eliminate cybersecurity blind spots and reduce response time for UDA. …Read more