Strengthening Singapore’s food security with technology
By Emon Zaman, Senior Vice-President, Asia Pacific, AVEVA | Jan 18, 2023 | Newsletter, Opinions
With less than 1% of its already scarce land designated for agri-food industries, how can Singapore leverage digital transformation to produce 30% of its food supply by 2030?
Read MoreHow can cybercrime not increase when it has already been democratized?
By Robert Pizzari, Vice President of Security (APAC), Splunk | Jan 17, 2023 | Newsletter, Opinions
This year, the growing availability of Cybercrime-as-a-Service will fuel even more cyberattacks and state-sponsored cyber warfare, impacting many areas of risks
Read MoreWill penalizing firms for paying ransoms have a reverse effect?
By Debashish Jyotiprakash, Vice President, Asia, Managing Director, India, Qualys | Dec 21, 2022 | Newsletter, Opinions
One firm argues with a “Yes”, and offers four other cybersecurity trends and predictions for readers’ analysis herein …
Read MoreWith a global recession expected, 2023 storage/backup strategies must be super resilient
By Sunny Chua, General Manager (Singapore), Wasabi Technologies | Dec 19, 2022 | Newsletter, Opinions
Here are four insights and predictions to substantiate global concerns about natural disasters and man-made crises — and boost preparedness and resilience
Read MoreData predictions for 2023
By Omer Singer, Head of Cybersecurity Strategy, Snowflake | Nov 16, 2022 | Data Protection, Most Read2, Newsletter, Opinions
Data Cloud company Snowflake recently released its data predictions for 2023
Read MoreSecuring your hybrid workplace
By Nadya Melic, VP and Head of Customer Solutions (APAC), Vodafone Business | Nov 10, 2022 | Opinions, Tips
While the pandemic has loosened its grip on the world, geopolitical factors and economic uncertainty have continued to influence how organizations conduct business.
Read MoreCorporate victims of data breaches have to reckon with the Court of Public Opinion
By Benjamin Harris, CEO, watchTowr | Oct 20, 2022 | Newsletter, Opinions
When large organizations fall victim to cyberattacks, they are viewed harshly by the general public. Can this damage be mitigated?
Read MoreSmart manufacturing requires smarter cyber vigilance. Here is why …
By Alex Mosher, Senior Vice-President, Global Enablement, Armis | Sep 20, 2022 | Newsletter, Opinions
The what, when, where, and why of modernizing cybersecurity in smart factory and OT environments.
Read MoreCritical elements of digital trust in an increasingly complex threat landscape
By Dr. Avesta Hojjati, VP, Research & Development, DigiCert | Sep 8, 2022 | Newsletter, Opinions
In a world looking at exponentially more digital interactions, connectivity and quantum computing, how should we approach digital threats and trust?
Read MoreWhat can toy building blocks teach developers about security best practices?
By Maty Siman, founder and CTO, Checkmarx | Sep 1, 2022 | Opinions
Cybercriminals are also developers, and they know how to attack the weakest links in any software architecture.
Read MoreRethinking cybersecurity in the age of digital transformation
By CybersecAsia editors | Aug 30, 2022 | IoT Security, Newsletter, Opinions
Automation and digitalization have contributed to the transformation of the manufacturing industry, but also making it the top target for cybercriminals.
Read MoreIn the Great Resignation, a toxic work culture is a cyber risk
By Andy Ng, Vice President and Managing Director, Asia South and Pacific Region, Veritas Technologies | Aug 10, 2022 | Newsletter, Opinions, Risk Management, Tips
Find out how workers who feel insecure and intimidated could hamper digitalization, introduce cyber risks, and then leave the organization vulnerable
Read MoreBad actors in the unreal world – a growing threat to businesses
By James Nunn-Price, Security Lead for Growth Markets, Accenture | Jul 12, 2022 | Newsletter, Opinions, Tips
The metaverse, undergirded by the digital economy, is a hybrid world of real and virtual. In this unreal AI-based world, authenticity is paramount if we were to surmount new cyberthreats.
Read MoreOnce a distorted concept, Zero Trust is now a mainstream defense strategy
By Sherif El Nabawi, Vice President, Engineering, APJ, CrowdStrike | Jun 28, 2022 | Newsletter, Opinions
When a presidential executive order recommends zero trust as a de facto cyber defense strategy, it is time to take heed…
Read MoreHow modernizing legacy operational technology is putting food chain security at risk
By Vijay Iyer, Regional Vice President, Solutions Engineering, APJ, Claroty | Apr 29, 2022 | Newsletter, Opinions
Regardless of whether geopolitical, criminal or espionage agendas are involved, global hyper-connectivity now demands food supply security to be beefed up.
Read MoreNot on our watch
By Jonathan Langer, Chief Operating Officer, Claroty and Co-Founder, Medigate | Apr 26, 2022 | IoT Security, Newsletter, Opinions
Cyber-attackers will have weaponized operational technology (OT) environments to harm or kill humans in the next few years.
Read MoreMoving SIEM to the cloud – more than just cost savings
By Neil Campbell, Vice President, APJ, Securonix | Apr 25, 2022 | Newsletter, Opinions, Tips
Key considerations for mitigating SIEM costs with the right architecture and deployment models.
Read MoreOvercoming the Costco Effect in software supply chain security
By Jonathan Knudsen, Senior Security Strategist, Synopsys Software Integrity Group | Apr 13, 2022 | Newsletter, Opinions, Software Development Lifecycle Security
Underestimating the size of something critical that you have taken on can lead to fragmented management and increased business risks.
Read MoreExperts respond to Spring4Shell vulnerability
By CybersecAsia editors | Apr 1, 2022 | News, Newsletter, Opinions
Will it be as severe as Log4Shell? Opinions differ, but here are some things we need to know about Spring4Shell.
Read MoreExpert views for World Backup Day
By CybersecAsia editors | Mar 31, 2022 | Newsletter, Opinions, Tips
In an age where backups are no longer enough, what are some key reminders organizations need to keep the lights on?
Read More
Voters-draw
Gamification listing
PARTICIPATE NOW |
|
Vote Now -Placment
BB HTC
News
Top-Sidebar-banner
Whitepapers
eBook: Ransomware Deception Use Cases
Learn how Metallic ® ThreatWiseTM , from Commvault, can provide proactive and advanced data protectionDownload WhitepaperPost-Pandemic APAC Digital Transformation and OT Cyber Security
All you need to know about digital transformation and OT cybersecurity in Asia in the …Download WhitepaperFour Things to Consider to Successfully and Securely Run Critical Applications in the Cloud
Use this checklist to securely and successfully run critical applications in the cloud and maximize …Download WhitepaperCriteria Guide When Choosing An Endpoint Detection and Response (EDR) Solution
Use this checklist to make a more informed decision when choosing an endpoint detection and …Download Whitepaper
More News
Middle-sidebar-banner
Case Studies
Grace implements Check Point solutions for comprehensive protection
A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read moreMaxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead moreCase Study: Metallic ® ThreatWiseTM Data Protection Use Cases
How Metallic ThreatWise helped customers across industriesRead more