How do large enterprises put AI and ML to effective use in network security?
By CybersecAsia editors | Nov 12, 2019 | Features, Network Security
Intelligent automation and predictive analytics will be integral to all security frameworks in large enterprises. But SMBs need not be left out....
Read MoreWhy biometric authentication is ideal for granting access to company vendors
By Jeffrey Kok, Vice President of Solution Engineer, Asia Pacific and Japan, CyberArk | Nov 4, 2019 | Critical Infrastructure Protection, Data Protection, Network Security, Opinions, Security Awareness & Education
Combining biometric authentication with a strong back-end solution empowers organizations to automatically manage access to remote vendors. In an...
Read MoreWi-Fi catastrophe: WeWork needs a serious rework
By L L Seow | Sep 26, 2019 | Email Security, Features, Network & Infrastructure Security, Network Security, News
How do you turn a massive first-mover business advantage into dust? By undermining customer Wi-Fi security. Coworking office space rental is a great...
Read MorePulse Secure brings convenience, security to 7-Eleven’s in-store network
By CybersecAsia editors | Aug 29, 2019 | Case Study, Network & Infrastructure Security, Network Security
To ensure both convenience to customers and security for its business, 7-Eleven looked to Pulse Secure for a secure and reliable network.
Read More

Whitepapers
Webinar: Best practices for critical event management
Join this on-demand presentation to learn how organizations are leveraging AtHoc to plan, prepare and …Download WhitepaperWebinar: Best practices for teleworkers at scale
Learn how your organization could more effectively provision network bandwidth, support and security for your …Download WhitepaperMaximize the ROI of detection and response
Cut costs by 44% by consolidating tools and streamlining operations for cyber-threat detection and response.Download WhitepaperHealthcare organization addresses cloud access management challenges
Healthcare and recruitment data are some of the most sensitive information, and need special protection …Download Whitepaper
More News
Case Studies
Are we ready for the next big breach?
How organizations across various industries prevent breaches, get deep visibility to detect and stop threats …Read moreIdaptive reduces complexity, increases security for NZ agricultural organization
Challenge: find a single sign-on solution to reduce complexity, minimize calls for password assistance, increase …Read moreEmail Security Threat Report 2020
Email and collaboration platforms are the connective tissue of most businesses and organizations, where information …Read moreLeading Malaysian developer zeroes in on threats with LogRhythm
Full visibility and intelligent detection eliminate cybersecurity blind spots and reduce response time for UDA. …Read more