Experts weigh in on Disney Plus’ user accounts hac...
By CybersecAsia editors | Nov 22, 2019 | Data Breaches, News | 0
Worst of the worst: 2019’s biggest data breaches
By Taylor Armerding, Software Security Expert, Synopsys Integrity Group | Jan 14, 2020 | Data Breaches, Features
If the impact of a data breach is measured by the number of people affected, here are the 6 worst of 2019. “Another day, another data...
Read MoreWorst of the worst: 2019’s biggest data breaches
By Taylor Armerding, Software Security Expert, Synopsys Integrity Group | Dec 12, 2019 | Data Breaches, Features
If the impact of a data breach is measured by the number of people affected, here are the 6 worst of 2019. “Another day, another data...
Read MoreExperts weigh in on Disney Plus’ user accounts hack
By CybersecAsia editors | Nov 22, 2019 | Data Breaches, News
Tis the season to be jolly, but not for Disney customers. Instead of preparing turkey stuffing, they suffered an attack of credential stuffing!...
Read MoreHalf of organizations feel unprepared to respond well to cyber attack or data breach
By CybersecAsia editors | Nov 6, 2019 | Cyber Intelligence, Data Breaches, News
A recent online survey has shed light on organizational attitudes towards cyber security initiatives and the differences across geographical...
Read MoreMalindo Air & Lion Air passenger records breached and exposed on web forums
By CybersecAsia editors | Sep 20, 2019 | Cloud Security, Data Breaches, News
Have you traveled around South East Asia recently? Did you travel on Malindo Air or Thai Lion Air? In 2019, more than 2.7 billion identity records...
Read MoreThe worst data breaches of 2018
By CybersecAsia editors | Jul 12, 2019 | Data Breaches, Features, Tips
Over a billion people’s data was compromised in 2018, offering a glimpse of what the cybersecurity and privacy landscape looks like in 2019 and what...
Read More

Whitepapers
Untangling the web of cloud security threats
The challenges of unfamiliarity with the cloud extends to cloud security, misconfiguration, threats and risks.Download WhitepaperWebinar: Best practices for critical event management
Join this on-demand presentation to learn how organizations are leveraging AtHoc to plan, prepare and …Download WhitepaperWebinar: Best practices for teleworkers at scale
Learn how your organization could more effectively provision network bandwidth, support and security for your …Download WhitepaperMaximize the ROI of detection and response
Cut costs by 44% by consolidating tools and streamlining operations for cyber-threat detection and response.Download Whitepaper
More News
Case Studies
Are we ready for the next big breach?
How organizations across various industries prevent breaches, get deep visibility to detect and stop threats …Read moreIdaptive reduces complexity, increases security for NZ agricultural organization
Challenge: find a single sign-on solution to reduce complexity, minimize calls for password assistance, increase …Read moreEmail Security Threat Report 2020
Email and collaboration platforms are the connective tissue of most businesses and organizations, where information …Read moreLeading Malaysian developer zeroes in on threats with LogRhythm
Full visibility and intelligent detection eliminate cybersecurity blind spots and reduce response time for UDA. …Read more