Only with appropriate measures can AI technology be truly transformative
By CybersecAsia editors | May 11, 2023 | Newsletter, Opinions
AI has the potential to be a transformative technology that can significantly impact our daily lives, but appropriate regulations need to be in place to ensure ethical, responsible use and...
Read MoreCybersecurity can no longer be an afterthought for a secure, resilient energy future
By Leo Simonovich, Global Head, Industrial Cyber and Digital Security, Siemens Energy | Apr 14, 2023 | Most Read2, Opinions, Sponsored
Cyber risks have grown along with the digital and technological revolution sweeping through the energy sector.
Read MoreGeopolitical instability and economic uncertainty – a perfect storm for cybercriminals
By John Fokker, Head of Threat Intelligence, Trellix | Feb 17, 2023 | Cyber Intelligence, Opinions
International intelligence and collaboration more and more clearly obvious the key to managing cybersecurity risks
Read MoreStrengthening Singapore’s food security with technology
By Emon Zaman, Senior Vice-President, Asia Pacific, AVEVA | Jan 18, 2023 | Newsletter, Opinions
With less than 1% of its already scarce land designated for agri-food industries, how can Singapore leverage digital transformation to produce 30% of its food supply by 2030?
Read MoreHow can cybercrime not increase when it has already been democratized?
By Robert Pizzari, Vice President of Security (APAC), Splunk | Jan 17, 2023 | Newsletter, Opinions
This year, the growing availability of Cybercrime-as-a-Service will fuel even more cyberattacks and state-sponsored cyber warfare, impacting many areas of risks
Read MoreWill penalizing firms for paying ransoms have a reverse effect?
By Debashish Jyotiprakash, Vice President, Asia, Managing Director, India, Qualys | Dec 21, 2022 | Newsletter, Opinions
One firm argues with a “Yes”, and offers four other cybersecurity trends and predictions for readers’ analysis herein …
Read MoreWith a global recession expected, 2023 storage/backup strategies must be super resilient
By Sunny Chua, General Manager (Singapore), Wasabi Technologies | Dec 19, 2022 | Newsletter, Opinions
Here are four insights and predictions to substantiate global concerns about natural disasters and man-made crises — and boost preparedness and resilience
Read MoreData predictions for 2023
By Omer Singer, Head of Cybersecurity Strategy, Snowflake | Nov 16, 2022 | Data Protection, Newsletter, Opinions
Data Cloud company Snowflake recently released its data predictions for 2023
Read MoreSecuring your hybrid workplace
By Nadya Melic, VP and Head of Customer Solutions (APAC), Vodafone Business | Nov 10, 2022 | Opinions, Tips
While the pandemic has loosened its grip on the world, geopolitical factors and economic uncertainty have continued to influence how organizations conduct business.
Read MoreCorporate victims of data breaches have to reckon with the Court of Public Opinion
By Benjamin Harris, CEO, watchTowr | Oct 20, 2022 | Newsletter, Opinions
When large organizations fall victim to cyberattacks, they are viewed harshly by the general public. Can this damage be mitigated?
Read MoreSmart manufacturing requires smarter cyber vigilance. Here is why …
By Alex Mosher, Senior Vice-President, Global Enablement, Armis | Sep 20, 2022 | Newsletter, Opinions
The what, when, where, and why of modernizing cybersecurity in smart factory and OT environments.
Read MoreCritical elements of digital trust in an increasingly complex threat landscape
By Dr. Avesta Hojjati, VP, Research & Development, DigiCert | Sep 8, 2022 | Newsletter, Opinions
In a world looking at exponentially more digital interactions, connectivity and quantum computing, how should we approach digital threats and trust?
Read MoreWhat can toy building blocks teach developers about security best practices?
By Maty Siman, founder and CTO, Checkmarx | Sep 1, 2022 | Opinions
Cybercriminals are also developers, and they know how to attack the weakest links in any software architecture.
Read MoreRethinking cybersecurity in the age of digital transformation
By CybersecAsia editors | Aug 30, 2022 | IoT Security, Newsletter, Opinions
Automation and digitalization have contributed to the transformation of the manufacturing industry, but also making it the top target for cybercriminals.
Read MoreIn the Great Resignation, a toxic work culture is a cyber risk
By Andy Ng, Vice President and Managing Director, Asia South and Pacific Region, Veritas Technologies | Aug 10, 2022 | Newsletter, Opinions, Risk Management, Tips
Find out how workers who feel insecure and intimidated could hamper digitalization, introduce cyber risks, and then leave the organization vulnerable
Read MoreBad actors in the unreal world – a growing threat to businesses
By James Nunn-Price, Security Lead for Growth Markets, Accenture | Jul 12, 2022 | Newsletter, Opinions, Tips
The metaverse, undergirded by the digital economy, is a hybrid world of real and virtual. In this unreal AI-based world, authenticity is paramount if we were to surmount new cyberthreats.
Read MoreOnce a distorted concept, Zero Trust is now a mainstream defense strategy
By Sherif El Nabawi, Vice President, Engineering, APJ, CrowdStrike | Jun 28, 2022 | Newsletter, Opinions
When a presidential executive order recommends zero trust as a de facto cyber defense strategy, it is time to take heed…
Read MoreHow modernizing legacy operational technology is putting food chain security at risk
By Vijay Iyer, Regional Vice President, Solutions Engineering, APJ, Claroty | Apr 29, 2022 | Newsletter, Opinions
Regardless of whether geopolitical, criminal or espionage agendas are involved, global hyper-connectivity now demands food supply security to be beefed up.
Read MoreNot on our watch
By Jonathan Langer, Chief Operating Officer, Claroty and Co-Founder, Medigate | Apr 26, 2022 | IoT Security, Newsletter, Opinions
Cyber-attackers will have weaponized operational technology (OT) environments to harm or kill humans in the next few years.
Read MoreMoving SIEM to the cloud – more than just cost savings
By Neil Campbell, Vice President, APJ, Securonix | Apr 25, 2022 | Newsletter, Opinions, Tips
Key considerations for mitigating SIEM costs with the right architecture and deployment models.
Read More
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
BB HTC
Middle-sidebar-banner
Whitepapers
451 Research Business Analyst Report On Cloud Security Delivery
Learn what to choose between native and third-party when delivering cloud security.Download WhitepaperState of Email Security Report for 2023
Mimecast’s seventh annual State of Email Security report comes as organisations all over the world …Download WhitepaperGartner Report on Choosing the Right Key Management as a Service
Learn how to mitigate your organization’s cloud data security and privacy risks.Download WhitepaperThe Next-Gen CSPM Buyer’s Guide
All you need to know about choosing your next-generation CSPM.Download Whitepaper
Case Studies
Mastercard ramps up fraud protection for e-commerce merchants with Vesta
Tie-up offers Mastercard Payment Gateway Services customers access to Vesta’s Payment Guarantee and Payment Protect …Read moreSome Q1 2023 DDoS trends point to hackers changing tack
They are now quicker to abandon unsuccessful attacks while beefing up campaigns on non-traditional targets, …Read morePharma firm reaps efficiency benefits after outgrowing network attached storage
By upgrading to a cloud-based and integrated data protection-and-cybersecurity platform, BDR Pharmaceuticals was finally exceeding …Read moreNTT Ltd expects to save US$5m annually after successful cloud migration test case
The firm recognizes that strong growth has led to inefficiencies and complexities that need to …Read more