Embracing a password-less future
By Victor Ng | Jun 25, 2020 | Cybersecurity Strategies, Features, Identity Theft & Online Fraud
We all know how insufficient passwords are, but what are the alternatives? The username/password model has been around for some time now. But in...
Read MoreImpact of fraud in APAC outpaces that of the US
By CybersecAsia editors | Oct 30, 2019 | Data Privacy, Data Protection, Features, Identity Theft & Online Fraud, Information Security, Risk Management
Regional study shows that global digitalization and the drive towards customer obsession has its costs: increased fraud and bottom line impact. In a...
Read More

Whitepapers
Untangling the web of cloud security threats
The challenges of unfamiliarity with the cloud extends to cloud security, misconfiguration, threats and risks.Download WhitepaperWebinar: Best practices for critical event management
Join this on-demand presentation to learn how organizations are leveraging AtHoc to plan, prepare and …Download WhitepaperWebinar: Best practices for teleworkers at scale
Learn how your organization could more effectively provision network bandwidth, support and security for your …Download WhitepaperMaximize the ROI of detection and response
Cut costs by 44% by consolidating tools and streamlining operations for cyber-threat detection and response.Download Whitepaper
More News
Case Studies
Are we ready for the next big breach?
How organizations across various industries prevent breaches, get deep visibility to detect and stop threats …Read moreIdaptive reduces complexity, increases security for NZ agricultural organization
Challenge: find a single sign-on solution to reduce complexity, minimize calls for password assistance, increase …Read moreEmail Security Threat Report 2020
Email and collaboration platforms are the connective tissue of most businesses and organizations, where information …Read moreLeading Malaysian developer zeroes in on threats with LogRhythm
Full visibility and intelligent detection eliminate cybersecurity blind spots and reduce response time for UDA. …Read more