Watch what your children play on your office lapto...
By CybersecAsia editors | Mar 22, 2023 | Cyberthreat Landscape, News, Newsletter | 0
Using AI to detect phishing: how does it work?
By Zac Amos | Mar 21, 2023 | Newsletter, Tips | 0
Phishing content can now contain three novel ways ...
By CybersecAsia editors | Mar 21, 2023 | News, Newsletter | 0
Improve application security in cloud native environments with these six measures
By Simon Pearce, CTO Advisor (APJC) Cisco AppDynamics | Mar 23, 2023 | Newsletter, Tips
A holistic, integrated strategy for application security is now essential for cloud-native businesses operating in an increasingly complex risk landscape
Read MoreWatch what your children play on your office laptop at home!
By CybersecAsia editors | Mar 22, 2023 | Cyberthreat Landscape, News, Newsletter
One cybersecurity firm saw a 57% increase in 2022 attacks on users whose work computers were used for gaming by kids
Read MoreUsing AI to detect phishing: how does it work?
By Zac Amos | Mar 21, 2023 | Newsletter, Tips
Here is a primer on how AI/ML algorithms can be used to monitor corporate correspondence for increasingly sophisticated (spear)phishing scams
Read MorePhishing content can now contain three novel ways to evade AI filters
By CybersecAsia editors | Mar 21, 2023 | News, Newsletter
The newly-deployed tactics are either improvisations of existing evasion methods such as typo-squatting, or new approaches to foil AI detection
Read MoreRansomware remains a potent threat in 2023 despite improved detection
By Soham Sengupta | Mar 20, 2023 | Features, Malware & Ransomware, Newsletter
Ransomware may show some decline, but awareness and education will still be key in fighting the threat as a company or as an individual.
Read MoreChatGPT-3, what have you done for defenders lately?
By L L Seow | Mar 20, 2023 | Newsletter, Tips
The world now knows how cybercriminals love the chatbot’s power to create chaos; but it is actually a double-edge sword …
Read MoreNew vishing techniques surfacing in South Korea
By CybersecAsia editors | Mar 17, 2023 | News, Newsletter
When a financial services app you are using causes an unexpected incoming call announcing irresistible offers, it is probably a scam
Read MoreKnow the four thrusts of corporate cyber resilience and vigilance
By Dennis Chung, Chief Security Officer, Microsoft Singapore | Mar 17, 2023 | Newsletter, Tips
Amid a global landscape of political and economic turbulence, talent shortages and escalating cyberattack/espionage sophistication, four axioms of cybersecurity remain perennial
Read More5 steps for boosting your organization’s ransomware resilience
By CR Srinivasan, Executive VP (Cloud and Cybersecurity ) and Chief Digital Officer, Tata Communications | Mar 16, 2023 | Newsletter, Tips
They may sound basic to IT defenders, but these five steps bear reiteration here in case complacency or misconceptions take root
Read MoreStalkerware abuse: time to tighten the noose?
By CybersecAsia editors | Mar 16, 2023 | News, Newsletter
Whether abusers are installing stalkerware casually or for malicious purposes, the world needs to eye them closely to regulate digital violence
Read MoreTackling the cyber threats from unmanaged and BYOD smart devices
By CybersecAsia editors | Mar 15, 2023 | Newsletter, Tips
With cloud applications causing heavy usage of web browsers, more remote workers and staff on BYOD schemes are becoming cyber targets
Read MoreAre cybersecurity personnel more immune to layoffs this year?
By CybersecAsia editors | Mar 15, 2023 | News, Newsletter
While most respondents in a multi-country survey on recession trends foresaw layoffs ahead, cybersecurity/IT talent were seen as highly marketable
Read MoreWith more concern over cloud security, too many tools could be counterproductive
By CybersecAsia editors | Mar 14, 2023 | Cloud Security, News, Newsletter
While increased cloud adoption and awareness of cloud-specific security issues are a good thing, tools sprawl was a dampener: survey
Read MoreName a key misconception about cloud data management that has persisted for four years
By CybersecAsia editors | Mar 13, 2023 | News, Newsletter
If you do not know the answer instantly, you could be putting your organization’s public cloud data at risk!
Read MoreAnalysis of top 100 breaches in 2022 reveal a common denominator
By CybersecAsia editors | Mar 13, 2023 | News, Newsletter
Among the top five factors leading to major global cyber incidents, one cyber weakness stood out in the Asia Pacific region…
Read MoreVastly expanded attack surfaces in 2022 had to result in greater cyberattacks
By CybersecAsia editors | Mar 10, 2023 | Cyberthreat Landscape, News, Newsletter
With state-sponsored threats and hacktivism thrown into the mix, one cybersecurity firm’s telemetry reflected the aggregated outcome for 2022
Read MoreAre IT teams around the world confident of dealing with email-based attacks?
By CybersecAsia editors | Mar 9, 2023 | Cyberthreat Landscape, News, Newsletter
One 2022 survey is showing that the increasing sophistication of such attacks has left some respondents unconfident of their defense capabilities
Read MoreData suggests threat actors and cyber scammers are changing tactics
By CybersecAsia editors | Mar 9, 2023 | Cyberthreat Landscape, News, Newsletter
With record numbers of crypto jacking attacks amid a substantial drop in global ransomware volume, researchers smell something brewing for 2023
Read MoreEach ransomware payment funds up to 10 more future cyberattacks
By CybersecAsia editors | Mar 7, 2023 | Malware & Ransomware, News, Newsletter
The monies also lead to bolder repeat attacks and across-the-board exacerbation of industry-specific cyber risks, according to one meta-analysis
Read MoreSecurity layers in MS 365 and Google Workspace “too thin”: survey
By CybersecAsia editors | Mar 6, 2023 | News, Newsletter
With emails remaining the number one cyber threat vector, why are the two collaboration software suites still so cyber impotent?
Read More
Voters-draw
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
BB HTC
News
Middle-sidebar-banner
Whitepapers
Conversational Microsoft 365 Data Backup
All you need to know about conversation Microsoft 365 data backup and recoveryDownload WhitepaperThe Global Enterprise Authentication Practices
Learn the global enterprise authentication practices in this Yubico survey research in partnership with Censuswide.Download WhitepaperModern Identity Security For Stronger Defense
All you need to know about the requirements, features, and benefits of achieving Modern Identity …Download WhitepaperSecure the Application Journey Towards Digital Acceleration
Learn how to apply consistent security policies and controls to secure digital transformation across clouds …Download Whitepaper
More News
Case Studies
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & Access Management
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & …Read moreGrace implements Check Point solutions for comprehensive protection
A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read moreMaxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead more