Securing the new digital workplace with BlackBerry
By CybersecAsia editors | Feb 11, 2020 | Cloud Security, Mobile Security, News | 0
Check Point Research reveals Android security flaw
By CybersecAsia editors | Sep 5, 2019 | Mobile Security, News | 0
What does using Bluetooth-enabled contact tracing mean for us?
By CybersecAsia editors | May 5, 2020 | Mobile Security, Newsletter, Tips
How Bluetooth contact tracing apps work, what it means for privacy, and what you should do about it. As more countries move along to develop contact...
Read MoreSecuring the new digital workplace with BlackBerry
By CybersecAsia editors | Feb 11, 2020 | Cloud Security, Mobile Security, News
ConvergeOne deploys new solution that combines secure access with continuous threat protection powered by AI. ConvergeOne, an IT services provider...
Read MoreMobile apps: insecure by default
By Taylor Armerding, Software Security Expert, Synopsys Integrity Group | Sep 7, 2019 | Mobile Security, Opinions
They are the best of apps, yet they are the worst of apps at the same time. Mobile applications have unlocked a world of almost magical convenience,...
Read MoreCheck Point Research reveals Android security flaw
By CybersecAsia editors | Sep 5, 2019 | Mobile Security, News
Security flaw that impacts phones from Samsung, Huawei, LG, and Sony leaves Android smartphones vulnerable to advanced SMS phishing attacks.
Read MoreSecuring 5G and IoT: software-defined zero-trust
By L L Seow and Victor Ng | Aug 30, 2019 | Cloud Security, Cybersecurity Strategies, Features, Mobile Security
High speed wireless connections and devices are redefining the digital landscape, and the zero-trust cybersecurity paradigm must keep up. The...
Read MoreDomino’s Pizza strengthens its endpoint security posture
By CybersecAsia editors | Aug 29, 2019 | Case Study, Mobile Security, Risk Management
Domino’s Pizza Japan is using technology to help deliver high-quality service also means realizing the importance of endpoint protection. It looked to Carbon Black to provide the best possible cloud-based...
Read MoreWill XDR improve security?
By Jon Clay, Director of Global Threat Communications, Trend Micro | Aug 28, 2019 | Data Protection, Features, Mobile Security, Opinions
What is the X in XDR, will it improve security and how does it expand existing EDR to protect against cyber-attacks? Cybercriminals and malicious...
Read More
Whitepapers
Cyberchat between Proficio and Splunk
Listen in as two experts discuss how CISOs and cybersecurity teams can better articulate the …Download WhitepaperData security predictions 2021
Zero Trust, ‘vishing’ and strategic approaches to a chaotic, rapidly evolving world.Download WhitepaperMDR checklist for your Splunk environment
Is your managed detection and response (MDR) service provider giving you the best security services …Download WhitepaperTokenization helps Indonesian financial technology and service provider with PCI compliance
The company needed to comply with PCI-DSS to securely exchange data with customers and partners.Download Whitepaper
Case Studies
Idaptive reduces complexity, increases security for NZ agricultural organization
Challenge: find a single sign-on solution to reduce complexity, minimize calls for password assistance, increase …Read moreAre we ready for the next big breach?
How organizations across various industries prevent breaches, get deep visibility to detect and stop threats …Read moreEmail Security Threat Report 2020
Email and collaboration platforms are the connective tissue of most businesses and organizations, where information …Read moreLeading Malaysian developer zeroes in on threats with LogRhythm
Full visibility and intelligent detection eliminate cybersecurity blind spots and reduce response time for UDA. …Read more