How to talk to your board and C-suite about cyber-preparedness
By Victor Ng | Jun 1, 2023 | Features, Newsletter, Tips
When the barbarians are at the gates, neither casual conversations nor polite protocols can do organizations much good.
Read MoreRansomware trends APAC organizations should be mindful of
By Victor Ng | May 30, 2023 | Features, Malware & Ransomware
New harassment tactics and double and triple extortion make the traditional advice about maintaining backups insufficient
Read MoreGenerative AI – the cybercriminal’s latest tool of terror?
Do generative AI applications such as ChatGPT and DALL-E provide cybercriminals with potentially powerful tools?
Read MoreWhy digital resilience pays off
The digital and physical worlds are merging in business, work and life – all the more reason we should pay more attention to digital resilience
Read MoreDealing with credential theft in a yet-to-be-passwordless world
Despite much talk about passwordless credentials, many organizations still depend on passwords for employee identity and access management.
Read MoreGood bots, bad bots: tackling the duality of the technology
By L L Seow | May 8, 2023 | Features, Newsletter
Advanced chatbots such as ChatGPT have shown us that the technology is indispensable. The trick is keep them reined-in …
Read MoreHow can we rid the world of passwords? Here are seven perspectives
By L L Seow | May 4, 2023 | Features, Newsletter
With countless cyber breaches originating from the exploitation of password-only authentication systems, is the world ready to take the next leap?
Read MoreBeating the bots in online fraud
Online fraud has been particularly rife on ticketing websites, with bots doing the most damage. It’s time we learn to beat the bots!
Read MoreSecuring critical infrastructure and OT as part of national defense
By Victor Ng | Apr 25, 2023 | Features, IoT Security
From financially motivated ransomware attacks to state-sponsored disruption of critical infrastructure, governments and enterprises are keenly aware that OT needs to be well protected.
Read MoreBridging India’s digitalization divide: cybersecurity startups
By Balasubramanian Swaminathan, IMAWS | Apr 20, 2023 | Features, Newsletter
Amid rushed and scattered digital transformation in the massive country, cybersecurity startups are springing up to fill in the gaps
Read MoreIncreasing data breach regulatory penalties did not do the trick. What next?
By L L Seow | Apr 17, 2023 | Features, Most Read1
Despite heavy increases in fines and reputational damage, even well-funded organizations are still falling victim to data breaches. What gives?
Read MoreShape up against the ransomware evolution or ship out!
By L L Seow | Mar 31, 2023 | Features, Most Read1, Newsletter
With the geopolitical weaponization of ransomware, tough multipartite action needs to be taken before the point of no return: industry observers
Read MoreGenerative AI: Double-edge sword or coin?
By Debasis Mohapatra| IMAWS | Mar 30, 2023 | Features, Newsletter
Experts from two sides of the fence argue for and against the floodgate of uses and abuses that the technology unleashes
Read MoreIoT devices in healthcare – saving or endangering lives?
By Victor Ng | Mar 28, 2023 | Features, IoT Security, Newsletter
Critical OT and IoT devices are prime targets for cybercriminals, while typically urgent focus on patient care takes attention away from cybersecurity
Read MoreOn World Backup Day, rethink your data protection strategy
By Soham Sengupta | Mar 28, 2023 | Features, Most Read2, Tips
Implementing a secure and cost-effective data backup strategy can go a long way in mitigating the damage caused by cyberattacks
Read MoreImpact of AI in an era of disinformation threats
In a world of generative AI such as GPT-4, organizations in Asia Pacific should be gearing up to combat the growing potentials of disinformation threats.
Read MoreRansomware remains a potent threat in 2023 despite improved detection
By Soham Sengupta | Mar 20, 2023 | Features, Malware & Ransomware, Newsletter
Ransomware may show some decline, but awareness and education will still be key in fighting the threat as a company or as an individual.
Read MoreIdentity management critical for IoT security
By Victor Ng | Mar 14, 2023 | Features, IoT Security
With non-human identities outnumbering humans more than 10:1, identity management has become business-critical.
Read MoreHow organizations in APAC should approach cyber risks
Cyberthreats are still on the rise, while our cloud-based digital economy is gearing up for the metaverse and quantum computing. How do we prepare our organizations for this onslaught?
Read MoreIdentity and access management: a crucial complement to secure digitalization
By L L Seow | Feb 28, 2023 | Features, Newsletter
With digitalization expanding corporate perimeters, passwordless authentication, phishing resistance, and decentralized identity technologies are now vital for enhanced cybersecurity and productivity
Read More
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
BB HTC
Middle-sidebar-banner
Whitepapers
451 Research Business Analyst Report On Cloud Security Delivery
Learn what to choose between native and third-party when delivering cloud security.Download WhitepaperState of Email Security Report for 2023
Mimecast’s seventh annual State of Email Security report comes as organisations all over the world …Download WhitepaperGartner Report on Choosing the Right Key Management as a Service
Learn how to mitigate your organization’s cloud data security and privacy risks.Download WhitepaperThe Next-Gen CSPM Buyer’s Guide
All you need to know about choosing your next-generation CSPM.Download Whitepaper
Case Studies
Mastercard ramps up fraud protection for e-commerce merchants with Vesta
Tie-up offers Mastercard Payment Gateway Services customers access to Vesta’s Payment Guarantee and Payment Protect …Read moreSome Q1 2023 DDoS trends point to hackers changing tack
They are now quicker to abandon unsuccessful attacks while beefing up campaigns on non-traditional targets, …Read morePharma firm reaps efficiency benefits after outgrowing network attached storage
By upgrading to a cloud-based and integrated data protection-and-cybersecurity platform, BDR Pharmaceuticals was finally exceeding …Read moreNTT Ltd expects to save US$5m annually after successful cloud migration test case
The firm recognizes that strong growth has led to inefficiencies and complexities that need to …Read more