With accelerated digitalization, businesses in Ind...
By Samrita Baruah, IMAWS | May 17, 2022 | Features | 0
Casting a new light on Shadow IT amid the new hybr...
By Carlo Cordova | May 9, 2022 | Features | 0
“Your bank account has been frozen. Click to verify your identity”: SCAM!
By Carlo Cordova | May 19, 2022 | Features, Newsletter
In the face of escalating digital fraud, how can banks balance protecting their customers against overly disruptive identity authentication processes?
Read MoreWith accelerated digitalization, businesses in India face cybersecurity concerns
By Samrita Baruah, IMAWS | May 17, 2022 | Features
Not that the urgent transformation has been painless—but it does show how a pandemic can pull a country together—digitally.
Read MoreCasting a new light on Shadow IT amid the new hybrid working landscape
By Carlo Cordova | May 9, 2022 | Features
While IT teams dream of curbing shadow IT activities, a better solution may be embraced with better IT governance …
Read MoreHow close are we to password-free security?
5th May 2022 marks World Password Day, but when could we start celebrating World Passwordless Day?
Read MoreAs the cyber threat landscape grows, defenders need to SOAR high
By Samrita Baruah, IMAWS | Apr 29, 2022 | Features, Newsletter
The birds’ eye view above ground yields greater threat visibility while automating routine monitoring, anomaly detection and response.
Read MoreMaking cyber-resilience part of your organization’s balance sheet
By Victor Ng | Apr 26, 2022 | Cyber Intelligence, Features
People are central to an organization – and to its cybersecurity and balance sheet.
Read MoreZero trust in India: people-driven vs process-driven vs device-driven
By Balasubramanian Swaminathan, IMAWS | Apr 19, 2022 | Features, Newsletter
With siloed organizations and a widespread lack of cyber awareness, the country needs to go back to basics for ZTN success.
Read MoreThink your passwords are strong? Check out this list…
By Carlo Cordova | Apr 13, 2022 | Features
Even a long and complex string of repeating numerals and letters amounts to slack protection, if they follow predictable patterns…
Read MoreDeveloping competitive edge in a world of automated cybersecurity
How to win by putting back the human touch in the efficient but cold and unfeeling world of AI-powered automation.
Read MoreMitigating fraud and identity risk without impairing customer experience
By L L Seow | Apr 8, 2022 | Features, Identity Theft & Online Fraud, Newsletter
How to maintain the fine balance between strong cybersecurity and good customer experience.
Read MoreStill a lack of boardroom awareness of cybersecurity in Asia Pacific
By CybersecAsia editors | Apr 6, 2022 | Features, News, Newsletter, Tips
Board level executives assume they’ll never be attacked, despite rising ransomware incidents, according to new Sophos survey.
Read MoreCan AI-enhanced blockchain solve financial security woes?
With billions of dollars lost to financial scams across the region in recent years, traditional finance institutions are relooking their security frameworks – can AI-enhanced blockchain help?
Read MoreA cybersecurity mesh architecture to handle security sprawl
Dealing with security sprawl as organizations deploy multiple security solutions across their networks.
Read MoreSecuring apps, data and the edge throughout the DX journey
By Victor Ng | Mar 22, 2022 | Features, Most Read2
As organizations transform digitally, so should their approach to cybersecurity.
Read MoreCyber vigilance through recognizing the domino effect
By Anamika Sahu | IMAWS | Mar 21, 2022 | Features
With more malware gaining a foothold into networks via fake certificates, early detection rests on strong IAM and IOC monitoring.
Read MoreTransforming public safety and security in Asia Pacific
How technology is evolving to address public safety and security concerns in the region.
Read MoreHow governments and enterprises should prepare for the 2022 cyberthreat landscape
By Victor Ng | Mar 7, 2022 | Cyberthreat Landscape, Features
Some key cybersecurity developments and trends to focus attention on in 2022.
Read MoreGiving the open source community a bad rap: Log4j bugs or OSS myths?
By CybersecAsia editors | Feb 24, 2022 | Features, Tips
Misgivings about patching the Log4j vulnerabilities fast have cast a shadow on open source software, but we may be forgetting something…
Read MoreWielding a double-edged sword in circumventing data privacy compliance: anonymization
By CybersecAsia editors | Feb 23, 2022 | Data Privacy, Features, Newsletter
Why comply with data protection laws when you can just anonymize personally-identifiable data? The situation is not so clear-cut ...
Read MoreTackling the boom in e-commerce and fraud
By Victor Ng | Feb 14, 2022 | Features, Identity Theft & Online Fraud
E-commerce and fraud go hand-in-hand. Both have boomed since the pandemic. What can organizations in APAC do to address these trends?
Read More
Gamification listing
PARTICIPATE NOW |
|
sponsors-RCA

Whitepapers
Tips: Top 6 Recommendations to Improve User Productivity with More Secure Network Edges
Security experts’ top recommendations for improving user productivity and securing the edge in a WFA …Download WhitepaperAccidental Convergence: Ultimate Guide To Secured IT/OT Operations
Key things you need to know about IT/OT convergenceDownload Whitepaper2022 Top Strategic Security Trends by Gartner: CSMA
All you need to know about Cybersecurity Mesh to attain a more defensive security postureDownload Whitepaper5 Keys to a Secure Work-From-Anywhere Solution
Here are 5 essential keys to securing work-from-anywhere for APAC organizationsDownload Whitepaper
News
Case Studies
Transport industry a major cyber target: Indonesia acts to ramp up defenses
The country’s largest taxi operator turns to AI-driven cybersecurity upgrades to protect its critical national …Read morePhilippines payment platform hardens cloud application security infrastructure
This includes rooting out vulnerabilities in container images and serverless functions, cloud misconfigurations, and hidden …Read moreIndonesian transport firm puts cybersecurity first as it pivots to digital
With multiple payment gateways, apps and APIs in use nationwide, the fast-growth business recognizes the …Read moreFortinet’s zero-trust security boosts innovation development of automotive manufacturing industry
How automotive manufacturers can leverage the zero-trust approach to secure operational technology.Read more