“Your bank account has been frozen. Click to verify your ide...
By Carlo Cordova | May 19, 2022
How close are we to password-free security?
By Victor Ng | Apr 29, 2022
HOT TOPIC CENTER
SECURITY NEWS
How a compromised API in government can lead to data leaks
By CybersecAsia editors | May 20, 2022
Although the Malaysian government agency involved refutes it, cybercriminals have repeatedly pointed to a specific API for their successful data heist.
EXPERT OPINIONS
How modernizing legacy operational technology is putting food chain security at risk
By Vijay Iyer, Regional Vice President, Solutions Engineering, APJ, Claroty | Apr 29, 2022
Regardless of whether geopolitical, criminal or espionage agendas are involved, global hyper-connectivity now demands food supply security to be beefed up.
TIPS
Three ways to fortify your security strategy amid increasing infrastructural complexity
With the cyber threat landscape complicated by laggard regulatory pressures and cyber complacence, it is time to go back to basics.
Cybersecurity: looking back 2021, looking ahead 2022
Jan 20, 2022
Ransomware attacks & enterprise response in APAC
Jul 29, 2021
Track an Attack on Critical Infrastructure
Jun 28, 2021
INFOGRAPHICS

Q1 2022 ransomware update Infographic


Charity scams in 2022 Infographic

Ransomware gold rush Infographic

Balancing risk and reward Infographic

State of Cybersecurity Report ASEAN 2022 Infographic
Latest
Cloud SecuritySecuring the future of work with a zero trust strategy
By Victor Ng | May 23, 2022
With hybrid work firmly in place for most organizations in Asia Pacific, the dynamic and ever-evolving cyber-threat landscape poses some critical challenges.
-
Database security concerns in the cloud
By Victor Ng | Nov 29, 2021
-
-
Latest
Cyber WarfareUkraine-Russia conflict: war also occurs in cyberspace
By CybersecAsia editors | Feb 28, 2022
One threat intelligence firm confirms that pro-Russian ransomware and phishing groups have stepped up efforts against Ukrainian military personnel and civilians.
-
-
-
Cyber Murder Mystery
By Check Point Software Technologies | May 21, 2020
Latest
Cyber IntelligenceMaking cyber-resilience part of your organization’s balance sheet
By Victor Ng | Apr 26, 2022
People are central to an organization – and to its cybersecurity and balance sheet.
-
-
Lapsus$ strike$ again$t Samsung
By CybersecAsia editors | Mar 10, 2022
-
Ransomware – a growing enterprise threat
By CrowdStrike | Sep 22, 2021
Gamification listing
PARTICIPATE NOW |
|
sponsors-RCA

Whitepapers
Tips: Top 6 Recommendations to Improve User Productivity with More Secure Network Edges
Security experts’ top recommendations for improving user productivity and securing the edge in a WFA …Download WhitepaperAccidental Convergence: Ultimate Guide To Secured IT/OT Operations
Key things you need to know about IT/OT convergenceDownload Whitepaper2022 Top Strategic Security Trends by Gartner: CSMA
All you need to know about Cybersecurity Mesh to attain a more defensive security postureDownload Whitepaper5 Keys to a Secure Work-From-Anywhere Solution
Here are 5 essential keys to securing work-from-anywhere for APAC organizationsDownload Whitepaper
News
Case Studies
Transport industry a major cyber target: Indonesia acts to ramp up defenses
The country’s largest taxi operator turns to AI-driven cybersecurity upgrades to protect its critical national …Read morePhilippines payment platform hardens cloud application security infrastructure
This includes rooting out vulnerabilities in container images and serverless functions, cloud misconfigurations, and hidden …Read moreIndonesian transport firm puts cybersecurity first as it pivots to digital
With multiple payment gateways, apps and APIs in use nationwide, the fast-growth business recognizes the …Read moreFortinet’s zero-trust security boosts innovation development of automotive manufacturing industry
How automotive manufacturers can leverage the zero-trust approach to secure operational technology.Read more