With just US$1,000, you can buy stolen credentials...
By L L Seow | Jan 16, 2023 | Features, Most Read1 | 0
2022 was a landmark year of cyber incidents: make ...
By CybersecAsia editors | Jan 10, 2023 | Features, Most Read1 | 0
Simplifying the adoption of Zero Trust with a data...
By Balasubramanian Swaminathan, IMAWS | Jan 10, 2023 | Features, Newsletter | 0
Tackling the emerging challenge of messaging- and call- security in South-east Asia
Did you know that seemingly harmless chatter in public forums and phone calls are being mined by multiple parties?
Read MoreWith just US$1,000, you can buy stolen credentials on Russian Dark Web forums
By L L Seow | Jan 16, 2023 | Features, Most Read1
What lies beneath this kind of illegal access brokerage, and why do the stolen credentials still work?
Read More2022 was a landmark year of cyber incidents: make 2023 better!
By CybersecAsia editors | Jan 10, 2023 | Features, Most Read1
Read on to get an overview of major 2022 cyberattacks and learn from them to harden cybersecurity postures this year.
Read MoreSimplifying the adoption of Zero Trust with a data-first SASE approach
By Balasubramanian Swaminathan, IMAWS | Jan 10, 2023 | Features, Newsletter
In this case, data centricity involves end-to-end consolidation and integration, as one proponent of the paradigm explains
Read MoreIn the continuing cyber arms race, AI and ML are hackers’ best tools
By L L Seow | Dec 13, 2022 | Features, Newsletter
In 2023, the world needs to merge CIAM and IAM with zero trust and AI/ML, according to this cyber market observer
Read MorePutting people and identity at the center of cloud security and strategy
By Victor Ng | Dec 12, 2022 | Cloud Security, Features, Newsletter
In response to findings from its 2022 survey, HashiCorp delivers zero trust remote access delivered in the cloud, and no-code provisioning to address infrastructure-as-code skills gap
Read MoreVietnam’s low cybersecurity awareness is a way of life, but there is hope
By Balasubramanian Swaminathan, IMAWS | Dec 9, 2022 | Features, Newsletter
Bolstered regulations, subsidies, funding and consumer education initiatives may soon ignite a sharp boost in cyber resilience there yet …
Read MoreCybersecurity predictions for 2023: Expect more global attacks, govt regulations, consolidation
By CybersecAsia editors | Nov 15, 2022 | Features, News, Tips
Hacktivism, deepfakes, attacks on business collaboration tools, new regulatory mandates, and pressure to cut complexity will top organizations’ security agendas over coming year, according to Check Point
Read MoreIn the surveillance industry, networked video cameras have five new axes of versatility
Smart network camera tech has raised various concerns about AI biases and cyber risks — but vendors are rising to the challenge …
Read MoreMachine learning in data governance: exploring the rubric
By Carlo Cordova | Nov 7, 2022 | Features
Relying on legacy governance systems and manual methods to monitor data may expose organizations to significant security, reputational and regulatory risks.
Read MoreSecuring the network of the future
Network security in the cloud era featured in a big way among experts and enterprise end-users at Aruba Atmosphere 2022
Read MoreGaming operators in the region struggle with a cyber game they dread losing
By L L Seow | Nov 2, 2022 | Features, Newsletter
A sustained DDoS attack could cause an online gambling to lose approximately US$115,000 per hour — a unsavory cat-and-mouse game with hackers/competitors
Read MoreAddressing five key global trends that can help stakeholders regain digital trust
By L L Seow | Oct 27, 2022 | Features, Newsletter
The five pervasive trends reframe trust perspectives and comfort levels while opening up multimodal possibilities for achieving greater global stability/accountability
Read MoreSupply chain attacks at the software development level: what you need to know
By Carlo Cordova | Oct 27, 2022 | Features, Newsletter
Software supply chains contain widely-used open source code that, when tainted by cybercriminals, can lead to widespread and perennially-lurking vulnerabilities
Read MoreLeveraging graph analytics and machine learning for real-time fraud detection
By Victor Ng | Oct 19, 2022 | Features, Identity Theft & Online Fraud
How should we address the growing sophistication of fraud tactics, in an age where the risk of fraud is prevalent amidst the digital transformation for APAC businesses?
Read MoreTime to bust some myths about securing digital identities in APAC
By L L Seow | Oct 5, 2022 | Features, Newsletter
As IoT and RPA generate more digital identities to be managed, regional organizations need to secure more than just login credentials
Read MoreCyber-attacks: the next pandemic?
By Victor Ng | Oct 3, 2022 | Cyberthreat Landscape, Features
Besides the COVID-19 pandemic, carried over from 2020 and 2021, what could be the next “pandemic” that would impact businesses in Asia Pacific in 2022 and beyond?
Read MoreThe world toned down on clickbait, and look what happens…
10 reasons to cull insidious clickbait that create cyber risks, bad social phenomena, and distrust.
Read MoreCybersecurity trends in Asia Pacific
By Victor Ng | Sep 20, 2022 | Cyberthreat Landscape, Features
As we enter the last quarter of 2022, how have global events and trends impacted the cybersecurity landscape in Asia Pacific?
Read MoreWhy do cybercriminals love to attack the gaming industry?
By Carlo Cordova | Sep 14, 2022 | Features, Newsletter
Actually they love attacking every industry, but gamers and gaming platforms—especially those in Asia—are especially attractive prey
Read More
Voters-draw
Gamification listing
PARTICIPATE NOW |
|
Vote Now -Placment
BB HTC
News
Top-Sidebar-banner
Whitepapers
eBook: Ransomware Deception Use Cases
Learn how Metallic ® ThreatWiseTM , from Commvault, can provide proactive and advanced data protectionDownload WhitepaperPost-Pandemic APAC Digital Transformation and OT Cyber Security
All you need to know about digital transformation and OT cybersecurity in Asia in the …Download WhitepaperFour Things to Consider to Successfully and Securely Run Critical Applications in the Cloud
Use this checklist to securely and successfully run critical applications in the cloud and maximize …Download WhitepaperCriteria Guide When Choosing An Endpoint Detection and Response (EDR) Solution
Use this checklist to make a more informed decision when choosing an endpoint detection and …Download Whitepaper
More News
Middle-sidebar-banner
Case Studies
Grace implements Check Point solutions for comprehensive protection
A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read moreMaxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead moreCase Study: Metallic ® ThreatWiseTM Data Protection Use Cases
How Metallic ThreatWise helped customers across industriesRead more