Decline in mobile malware in South-east Asia, but ...
By CybersecAsia editors | Jun 17, 2022 | Cyberthreat Landscape, Mobile Security, Newsletter, Tips | 0
More crypto wallet risks ‘in store’ for all mobile...
By CybersecAsia editors | Apr 12, 2022 | Mobile Security, News, Newsletter | 0
What does using Bluetooth-enabled contact tracing ...
By CybersecAsia editors | May 5, 2020 | Mobile Security, Newsletter, Tips | 0
How have hybrid- and remote-working trends impacted mobile cybersecurity?
By CybersecAsia editors | Aug 3, 2022 | Mobile Security, News, Newsletter
A small survey by a global communications firm has some indicators of the worsened risk environment to raise alarm bellsRead More
Decline in mobile malware in South-east Asia, but hackers show growing sophistication
By CybersecAsia editors | Jun 17, 2022 | Cyberthreat Landscape, Mobile Security, Newsletter, Tips
Despite a decrease in the number of attacks, users should not be letting their guard down, Kaspersky warns.Read More
More crypto wallet risks ‘in store’ for all mobile platforms
By CybersecAsia editors | Apr 12, 2022 | Mobile Security, News, Newsletter
Source code for a crypto wallet app scam is openly available, while even an official app store hosted trojanized wallet apps...Read More
What does using Bluetooth-enabled contact tracing mean for us?
By CybersecAsia editors | May 5, 2020 | Mobile Security, Newsletter, Tips
How Bluetooth contact tracing apps work, what it means for privacy, and what you should do about it. As more countries move along to develop contact...Read More
Securing the new digital workplace with BlackBerry
By CybersecAsia editors | Feb 11, 2020 | Cloud Security, Mobile Security, News
ConvergeOne deploys new solution that combines secure access with continuous threat protection powered by AI. ConvergeOne, an IT services provider...Read More
Mobile apps: insecure by default
By Taylor Armerding, Software Security Expert, Synopsys Integrity Group | Sep 7, 2019 | Mobile Security, Opinions
They are the best of apps, yet they are the worst of apps at the same time. Mobile applications have unlocked a world of almost magical convenience,...Read More
Check Point Research reveals Android security flaw
By CybersecAsia editors | Sep 5, 2019 | Mobile Security, News
Security flaw that impacts phones from Samsung, Huawei, LG, and Sony leaves Android smartphones vulnerable to advanced SMS phishing attacks.Read More
Securing 5G and IoT: software-defined zero-trust
By L L Seow and Victor Ng | Aug 30, 2019 | Cloud Security, Cybersecurity Strategies, Features, Mobile Security
High speed wireless connections and devices are redefining the digital landscape, and the zero-trust cybersecurity paradigm must keep up. The...Read More
Domino’s Pizza strengthens its endpoint security posture
By CybersecAsia editors | Aug 29, 2019 | Case Study, Mobile Security, Risk Management
Domino’s Pizza Japan is using technology to help deliver high-quality service also means realizing the importance of endpoint protection. It looked to Carbon Black to provide the best possible cloud-based...Read More
Will XDR improve security?
By Jon Clay, Director of Global Threat Communications, Trend Micro | Aug 28, 2019 | Data Protection, Features, Mobile Security, Opinions
What is the X in XDR, will it improve security and how does it expand existing EDR to protect against cyber-attacks? Cybercriminals and malicious...Read More
Gamification listing or Participate Now
Vote Now -Placement(Google Ads)
A SANS Survey: Rethinking the Sec in DevSecOps: Security as CodeList of the top AppSec trends and interesting new innovations in 2022.Download Whitepaper
Developers Guide: Top 10 OWASP API Security IssuesA developer’s technical guide to the top 10 Open Web Application Security Project (OWASP) API …Download Whitepaper
Conversational Microsoft 365 Data BackupAll you need to know about conversation Microsoft 365 data backup and recoveryDownload Whitepaper
The Global Enterprise Authentication PracticesLearn the global enterprise authentication practices in this Yubico survey research in partnership with Censuswide.Download Whitepaper
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & Access ManagementCyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & …Read more
Grace implements Check Point solutions for comprehensive protectionA leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read more
Maxim’s ensures business continuity, rapid recovery of critical data with VeeamHong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read more
Secure SD-Branch Facilitates Technology Kennards Hire ModernizationHow secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead more