Which web services and platforms cause the most pr...
By CybersecAsia editors | Aug 31, 2021 | Data Privacy, News, Newsletter | 0
Managing and protecting data in a world of tracing...
By Victor Ng | Jun 11, 2021 | Data Privacy, Data Protection, Features, Newsletter | 0
Coalition against stalkerware
By Kaspersky | Nov 21, 2019 | Data Privacy, Data Protection, Whitepapers | 0
Wielding a double-edged sword in circumventing data privacy compliance: anonymization
By CybersecAsia editors | Feb 23, 2022 | Data Privacy, Features, Newsletter
Why comply with data protection laws when you can just anonymize personally-identifiable data? The situation is not so clear-cut ...
Read MoreWhich web services and platforms cause the most privacy concerns?
By CybersecAsia editors | Aug 31, 2021 | Data Privacy, News, Newsletter
With internet users becoming more wary of online safety, one privacy checker website may hold some clues …
Read MoreManaging and protecting data in a world of tracing apps
By Victor Ng | Jun 11, 2021 | Data Privacy, Data Protection, Features, Newsletter
How would the phasing out of physical identity cards and the use of COVID-19 contact tracing apps impact the way data is managed and protected in ASEAN?
Read MoreHigh demand for training in data protection
By CybersecAsia editors | Dec 22, 2019 | Cybersecurity Training & Certification, Data Privacy, Data Protection, News
To cope with tightened data privacy laws around the world, more certification programs will be needed to produce skilled professionals. The increasing demand for data privacy, as well as the perpetual threat of data...
Read MoreCoalition against stalkerware
By Kaspersky | Nov 21, 2019 | Data Privacy, Data Protection, Whitepapers
New global working group combines expertise for victim support and cybersecurity to help affected users. The threat landscape for stalkerware – a...
Read MoreData privacy – from understanding to believing to enforcing
By Victor Ng | Nov 20, 2019 | Data Privacy, Features
Large gaps still need to be bridged to effectively ensure data privacy and security. There were many defining moments for data privacy in 2018, from...
Read MoreImpact of fraud in APAC outpaces that of the US
By CybersecAsia editors | Oct 30, 2019 | Data Privacy, Data Protection, Features, Identity Theft & Online Fraud, Information Security, Risk Management
Regional study shows that global digitalization and the drive towards customer obsession has its costs: increased fraud and bottom line impact. In a...
Read MoreImproving cybersecurity and compliance in financial services with endpoint security
By Monica Hovsepian, Industry Strategist for Financial Services, OpenText | Oct 30, 2019 | Cyber-forensics, Data Privacy, Opinions
How security professionals in financial services can more effectively monitor endpoints to help them find and remediate threats. In some ways,...
Read MoreHave Windows 10 and Office 365 breached GDPR?
By CybersecAsia editors | Oct 24, 2019 | Data Privacy, Features, Opinions
Microsoft’s products, particularly its telemetry and data collection/sharing from Windows 10 and Office 365, may not comply with GDPR. The...
Read MoreA double-edged sword: transparency and privacy in a data-driven world
By Ada Xiao, Chief Strategy Officer, PlatON | Sep 26, 2019 | Data Privacy, Opinions
Both transparency and data privacy must be prioritized by businesses. Is blockchain the solution? The rise of globalization has facilitated...
Read MoreBreach of PDPA in Singapore reaches all-time high
By CybersecAsia editors | Sep 20, 2019 | Data Privacy, Data Protection, News
Fines for PDPA breaches for organizations have hit an all-time high as reported by the Data Protection Excellence (DPEX) Centre. As of August 2019,...
Read More
Voters-draw
Gamification listing
PARTICIPATE NOW |
|
Vote Now -Placment
BB HTC
News
Top-Sidebar-banner
Whitepapers
eBook: Ransomware Deception Use Cases
Learn how Metallic ® ThreatWiseTM , from Commvault, can provide proactive and advanced data protectionDownload WhitepaperPost-Pandemic APAC Digital Transformation and OT Cyber Security
All you need to know about digital transformation and OT cybersecurity in Asia in the …Download WhitepaperFour Things to Consider to Successfully and Securely Run Critical Applications in the Cloud
Use this checklist to securely and successfully run critical applications in the cloud and maximize …Download WhitepaperCriteria Guide When Choosing An Endpoint Detection and Response (EDR) Solution
Use this checklist to make a more informed decision when choosing an endpoint detection and …Download Whitepaper
More News
Middle-sidebar-banner
Case Studies
Maxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead moreCase Study: Metallic ® ThreatWiseTM Data Protection Use Cases
How Metallic ThreatWise helped customers across industriesRead moreFortinet Security Fabric Protects Yedpay’s New Cloud Environment
Yedpay Power Its Business Growth with Fortinet Security FabricRead more