How well is your data being protected?
By Victor Ng | Feb 7, 2022 | Data Protection, Features, Newsletter | 0
Database security concerns in the cloud
By Victor Ng | Nov 29, 2021 | Cloud Security, Data Protection, Features, Newsletter | 0
Ransomware: how your data can be your best defense
By Victor Ng | Nov 8, 2021 | Data Protection, Features, Malware & Ransomware | 0
Top trends in data protection for 2022
By Veeam Software | Feb 23, 2022 | Data Protection, Infographic, Newsletter
Latest global findings on the impact, costs and benefits of modern data protection in the cloud era.
Read MoreHow well is your data being protected?
By Victor Ng | Feb 7, 2022 | Data Protection, Features, Newsletter
The digital age we live in has heightened the need for data protection, for businesses and individuals alike.
Read MoreDatabase security concerns in the cloud
By Victor Ng | Nov 29, 2021 | Cloud Security, Data Protection, Features, Newsletter
Should your organization move your database to the cloud? How well can cloud security concerns be mitigated?
Read MoreRansomware: how your data can be your best defense
By Victor Ng | Nov 8, 2021 | Data Protection, Features, Malware & Ransomware
Cybercriminals are targeting your data for ransom, but true data immutability and visibility can be your best defense.
Read MoreData protection in the hybrid work environment
By Victor Ng | Sep 20, 2021 | Data Protection, Features
The way we work has certainly changed in 2021, but has the way we protect our data kept pace?
Read MoreManaging and protecting data in a world of tracing apps
By Victor Ng | Jun 11, 2021 | Data Privacy, Data Protection, Features, Newsletter
How would the phasing out of physical identity cards and the use of COVID-19 contact tracing apps impact the way data is managed and protected in ASEAN?
Read MoreTapping on the five pillars of the Zero Trust model
By Geoff Soon, Managing Director, South Asia, Snowflake | May 21, 2021 | Cloud Security, Data Protection, Newsletter, Tips
So goes the mantra: never trust, always verify; encrypt data; least privilege until more is justified; and surveil for abnormal behavior.
Read MoreKeeping up with data protection and privacy regulations in Asia Pacific
By Victor Ng | May 10, 2021 | Data Protection, Features, Newsletter
To satisfy newer and tougher data laws being enacted across the region, what should organizations be concerned about, and what should they do?
Read MoreData management and protection in the WFH multi-cloud era
By Victor Ng | Sep 4, 2020 | Data Protection, Features, Newsletter, Tips
The need for organizations to deploy modern processes to secure and manage their data is more critical now than ever. Data continues to grow at exponential rates. At the same...
Read MoreChoosing the right path in your data management journey
By Victor Ng | Jul 16, 2020 | Cloud Security, Data Protection, Features, Newsletter
As data proliferates in the cloud and on-premise, data breaches and regulatory compliance are proving to be burdensome – financially or otherwise....
Read MoreThe business risks of telecommuting: know your circle of defense
By Raymond Goh, Head of Systems Engineering, APJ, Veeam Software | Apr 21, 2020 | Data Protection, Newsletter, Opinions
By now, the whole world knows how dangerous the sudden WFH migration is to cybersecurity: here is another expert perspective… Over the last few...
Read MoreWhy corporate data compliance can make or break an enterprise
By Victor Ng | Apr 7, 2020 | Data Protection, Features, Newsletter
With the growing need to improve data governance and corporate data compliance, what should organizations pay most attention to? According to Micro...
Read MoreFour data security megatrends you need to know for the decade ahead
By Saravanan Krishnan, General Manager, Data Protection Solutions, South Asia, Dell Technologies | Apr 3, 2020 | Data Protection, Features, Newsletter, Opinions
The exponential growth of data value and volume means that enterprise survival hinges on obsessing over its use and protection. Over the past year,...
Read MoreMounting cyberattacks and disruptive events affecting 84% of organizations: APJ survey
By CybersecAsia editors | Apr 2, 2020 | Data Protection, News, Newsletter
Organizations using more than one data protection vendor were almost four times more vulnerable to a cyber incident. Organizations in the Asia...
Read MoreBetter biometrics at work: defending your data from attackers
By Carlo Cordova | Dec 26, 2019 | Data Protection, Features, Risk Management
Many organizations, including government entities, are deploying biometrics. How can this tech be toughened against data theft? A worst-case...
Read MoreHigh demand for training in data protection
By CybersecAsia editors | Dec 22, 2019 | Cybersecurity Training & Certification, Data Privacy, Data Protection, News
To cope with tightened data privacy laws around the world, more certification programs will be needed to produce skilled professionals....
Read MoreOpen banking: security challenges no major cause for concern
By Shahnawaz Backer, Principal Security Advisor, APCJ, F5 Networks | Dec 16, 2019 | Data Protection, Opinions
Across Asia, economies are adopting open banking, but concerns have been raised over security and privacy of customer data. When it comes to open...
Read MoreCoalition against stalkerware
By Kaspersky | Nov 21, 2019 | Data Privacy, Data Protection, Whitepapers
New global working group combines expertise for victim support and cybersecurity to help affected users. The threat landscape for stalkerware – a...
Read MoreWhy biometric authentication is ideal for granting access to company vendors
By Jeffrey Kok, Vice President, Solution Engineer, Asia Pacific & Japan, CyberArk | Nov 4, 2019 | Critical Infrastructure Protection, Data Protection, Network Security, Opinions, Security Awareness & Education
Combining biometric authentication with a strong back-end solution empowers organizations to automatically manage access to remote vendors. In an...
Read MoreImpact of fraud in APAC outpaces that of the US
By CybersecAsia editors | Oct 30, 2019 | Data Privacy, Data Protection, Features, Identity Theft & Online Fraud, Information Security, Risk Management
Regional study shows that global digitalization and the drive towards customer obsession has its costs: increased fraud and bottom line impact. In a...
Read More
Gamification listing
PARTICIPATE NOW |
|
sponsors-RCA

Whitepapers
2021 Human Factor Report
How ransomware, email threats, and other threat actors evolved and the latest techniques used in …Download Whitepaper2022 Global Report on Insider Threat Cost
Know the cost of credential theft to APAC organisationsDownload WhitepaperTips: Top 6 Recommendations to Improve User Productivity with More Secure Network Edges
Security experts’ top recommendations for improving user productivity and securing the edge in a WFA …Download WhitepaperAccidental Convergence: Ultimate Guide To Secured IT/OT Operations
Key things you need to know about IT/OT convergenceDownload Whitepaper
More News
Case Studies
Transport industry a major cyber target: Indonesia acts to ramp up defenses
The country’s largest taxi operator turns to AI-driven cybersecurity upgrades to protect its critical national …Read morePhilippines payment platform hardens cloud application security infrastructure
This includes rooting out vulnerabilities in container images and serverless functions, cloud misconfigurations, and hidden …Read moreIndonesian transport firm puts cybersecurity first as it pivots to digital
With multiple payment gateways, apps and APIs in use nationwide, the fast-growth business recognizes the …Read moreFortinet’s zero-trust security boosts innovation development of automotive manufacturing industry
How automotive manufacturers can leverage the zero-trust approach to secure operational technology.Read more