Half of organizations feel unprepared to respond w...
By CybersecAsia editors | Nov 6, 2019 | Cyber Intelligence, Data Breaches, News | 0
Malindo Air & Lion Air passenger records brea...
By CybersecAsia editors | Sep 20, 2019 | Cloud Security, Data Breaches, News | 0
The worst data breaches of 2018
By CybersecAsia editors | Jul 12, 2019 | Data Breaches, Features, Tips | 0
Experts weigh in on Disney Plus’ user accounts hack
By CybersecAsia editors | Nov 22, 2019 | Data Breaches, News
Tis the season to be jolly, but not for Disney customers. Instead of preparing turkey stuffing, they suffered an attack of credential stuffing!...
Read MoreHalf of organizations feel unprepared to respond well to cyber attack or data breach
By CybersecAsia editors | Nov 6, 2019 | Cyber Intelligence, Data Breaches, News
A recent online survey has shed light on organizational attitudes towards cyber security initiatives and the differences across geographical...
Read MoreMalindo Air & Lion Air passenger records breached and exposed on web forums
By CybersecAsia editors | Sep 20, 2019 | Cloud Security, Data Breaches, News
Have you traveled around South East Asia recently? Did you travel on Malindo Air or Thai Lion Air? In 2019, more than 2.7 billion identity records...
Read MoreThe worst data breaches of 2018
By CybersecAsia editors | Jul 12, 2019 | Data Breaches, Features, Tips
Over a billion people’s data was compromised in 2018, offering a glimpse of what the cybersecurity and privacy landscape looks like in 2019 and what...
Read More
Voters-draw
Thales Gamification
Gamification listing
PARTICIPATE NOW |
|
Vote Now -Placment
BB HTC
Top-Sidebar-banner
Whitepapers
Criteria Guide When Choosing An Endpoint Detection and Response (EDR) Solution
Use this checklist to make a more informed decision when choosing an endpoint detection and …Download WhitepaperPost-Pandemic APAC Digital Transformation and OT Cyber Security
All you need to know about digital transformation and OT cybersecurity in Asia in the …Download WhitepaperFour Things to Consider to Successfully and Securely Run Critical Applications in the Cloud
Use this checklist to securely and successfully run critical applications in the cloud and maximize …Download WhitepaperCyber Threat Predictions for 2023 by FortiGuard Labs
Learn the cyber threat predictions in 2023 in this annual perspective by FortiGuard Labs.Download Whitepaper
Middle-sidebar-banner
Case Studies
Maxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead moreFortinet Security Fabric Protects Yedpay’s New Cloud Environment
Yedpay Power Its Business Growth with Fortinet Security FabricRead moreCase Studies: 1.5 million lessons from the SingHealth hack
Learn the lessons from this post-mortem of a healthcare information hackRead more