Identity management critical for IoT security
By Victor Ng | Mar 14, 2023 | Features, IoT Security | 0
Disclosures of vulnerabilities in industrial contr...
By CybersecAsia editors | Feb 22, 2023 | IoT Security, News, Newsletter | 0
Rethinking cybersecurity in the age of digital tra...
By CybersecAsia editors | Aug 30, 2022 | IoT Security, Newsletter, Opinions | 0
IoT devices in healthcare – saving or endangering lives?
By Victor Ng | Mar 28, 2023 | Features, IoT Security, Newsletter
Critical OT and IoT devices are prime targets for cybercriminals, while typically urgent focus on patient care takes attention away from cybersecurity
Read MoreIdentity management critical for IoT security
By Victor Ng | Mar 14, 2023 | Features, IoT Security
With non-human identities outnumbering humans more than 10:1, identity management has become business-critical.
Read MoreDisclosures of vulnerabilities in industrial control systems: the more the better
By CybersecAsia editors | Feb 22, 2023 | IoT Security, News, Newsletter
One biannual study estimates an 80% increase in reported vulnerabilities in the last half of 2022 in certain sectors.
Read MoreRethinking cybersecurity in the age of digital transformation
By CybersecAsia editors | Aug 30, 2022 | IoT Security, Newsletter, Opinions
Automation and digitalization have contributed to the transformation of the manufacturing industry, but also making it the top target for cybercriminals.
Read MoreAre IoT and OT networks in the gunsights of ransomware groups?
By CybersecAsia editors | Jun 3, 2022 | IoT Security, News, Newsletter
As such industrial connectivity networks proliferate, one cybersecurity firm has posted proof that the threat can be clear and present
Read MoreNot on our watch
By Jonathan Langer, Chief Operating Officer, Claroty and Co-Founder, Medigate | Apr 26, 2022 | IoT Security, Newsletter, Opinions
Cyber-attackers will have weaponized operational technology (OT) environments to harm or kill humans in the next few years.
Read MoreFortinet’s zero-trust security boosts innovation development of automotive manufacturing industry
By Fortinet | Mar 23, 2022 | Case Study, IoT Security, Sponsored
How automotive manufacturers can leverage the zero-trust approach to secure operational technology.
Read MoreDismal cybersecurity focus in IoT adoption: a global threat to life and limb
By CybersecAsia editors | Mar 3, 2022 | IoT Security, News, Newsletter
An alarming lack of cyber protection has been found in 43% of organizations handling equipment impacting health and safety: survey
Read MoreRepaving the rocky road to better IoT security starts here
By Taylor Armerding, Software Security Expert, Synopsys Integrity Group | Mar 6, 2020 | Features, IoT Security, Newsletter, Opinions
Before a global IoT disaster strikes, we need to review consumer culture, government regulation, habits and manufacturer mindsets urgently....
Read MoreThe Cybersecurity Labeling Scheme is our home cyber “wake-up call”
By Tom Kellermann, Head Cybersecurity Strategist, VMware Carbon Black | Mar 5, 2020 | IoT Security, Newsletter, Tips
IoT device manufacturers need this nudge to buck up. But the rest of the security is still up to us. In efforts to secure its dense cyberspace...
Read MoreVulnerability exposes more than 10,000 Xiaomi smart pet feeders
By CybersecAsia editors | Oct 30, 2019 | IoT Security, News, Software Development Lifecycle Security
Feeding schedules and safety of pets at risk if hackers exploit this vulnerability, as well as exploit it for IoT attacks. A Russian security...
Read MoreCybersecurity in the automotive industry
By Victor Ng | Aug 28, 2019 | Cyberthreat Landscape, Features, IoT Security, Security Trends & Developments, Software Development Lifecycle Security
How safe and secure are smart, connected and driverless cars? What are the cybersecurity concerns the automotive industry needs to pay attention to?
Read More
Voters-draw
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
BB HTC
News
Middle-sidebar-banner
Whitepapers
A SANS Survey: Rethinking the Sec in DevSecOps: Security as Code
List of the top AppSec trends and interesting new innovations in 2022.Download WhitepaperDevelopers Guide: Top 10 OWASP API Security Issues
A developer’s technical guide to the top 10 Open Web Application Security Project (OWASP) API …Download WhitepaperConversational Microsoft 365 Data Backup
All you need to know about conversation Microsoft 365 data backup and recoveryDownload WhitepaperThe Global Enterprise Authentication Practices
Learn the global enterprise authentication practices in this Yubico survey research in partnership with Censuswide.Download Whitepaper
More News
Case Studies
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & Access Management
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & …Read moreGrace implements Check Point solutions for comprehensive protection
A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read moreMaxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead more