Repaving the rocky road to better IoT security starts here
By Taylor Armerding, Software Security Expert, Synopsys Integrity Group | Mar 6, 2020 | Features, IoT Security, Newsletter, Opinions
Before a global IoT disaster strikes, we need to review consumer culture, government regulation, habits and manufacturer mindsets urgently....
Read MoreThe Cybersecurity Labeling Scheme is our home cyber “wake-up call”
By Tom Kellermann, Head Cybersecurity Strategist, VMware Carbon Black | Mar 5, 2020 | IoT Security, Newsletter, Tips
IoT device manufacturers need this nudge to buck up. But the rest of the security is still up to us. In efforts to secure its dense cyberspace...
Read MoreVulnerability exposes more than 10,000 Xiaomi smart pet feeders
By CybersecAsia editors | Oct 30, 2019 | IoT Security, News, Software Development Lifecycle Security
Feeding schedules and safety of pets at risk if hackers exploit this vulnerability, as well as exploit it for IoT attacks. A Russian security...
Read MoreCybersecurity in the automotive industry
By Victor Ng | Aug 28, 2019 | Cyberthreat Landscape, Features, IoT Security, Security Trends & Developments, Software Development Lifecycle Security
How safe and secure are smart, connected and driverless cars? What are the cybersecurity concerns the automotive industry needs to pay attention to?
Read More
Whitepapers
Tokenization helps Indonesian financial technology and service provider with PCI compliance
The company needed to comply with PCI-DSS to securely exchange data with customers and partners.Download WhitepaperWebinar: The 2021 threat forecast
Join this on-demand session for a peek into the threat landscape in 2021…Download Whitepaper2020 Gartner Magic Quadrant for Application Security Testing
Synopsys placed highest for both the ability to execute and completeness of vision.Download Whitepaper2020 Open Source Security and Risk Analysis report
Here’s your personal copy of one of the industry’s most important analysis report.Download Whitepaper
Case Studies
Idaptive reduces complexity, increases security for NZ agricultural organization
Challenge: find a single sign-on solution to reduce complexity, minimize calls for password assistance, increase …Read moreAre we ready for the next big breach?
How organizations across various industries prevent breaches, get deep visibility to detect and stop threats …Read moreEmail Security Threat Report 2020
Email and collaboration platforms are the connective tissue of most businesses and organizations, where information …Read moreLeading Malaysian developer zeroes in on threats with LogRhythm
Full visibility and intelligent detection eliminate cybersecurity blind spots and reduce response time for UDA. …Read more