Is the world more secure in their remote-working security now?
15 months after panicked migrations to the Cloud and remote-working arrangements, is the world handing the increase in cybercrime well?
Read MoreSelect Page
By CybersecAsia editors and webmaster webmaster | Tuesday, June 8, 2021, 8:56 AM Asia/Singapore | News, Newsletter, Opinions
15 months after panicked migrations to the Cloud and remote-working arrangements, is the world handing the increase in cybercrime well?
Read MoreBy Thales and webmaster webmaster | Monday, May 17, 2021, 9:28 AM Asia/Singapore | Sponsored, Whitepapers
The company needed to comply with PCI-DSS to securely exchange data with customers and partners.
Read MoreBy Victor Ng | Thursday, April 22, 2021, 10:56 AM Asia/Singapore | Features, Newsletter
Social engineering techniques go beyond email phishing to exploit the remote-working new normal.
Read MoreBy Thales and webmaster webmaster | Monday, April 12, 2021, 9:59 AM Asia/Singapore | Sponsored, Whitepapers
Ransomware has been on the rise and growing more sophisticated. Old protection methods can’t deal with it.
Read MoreBy Thales and webmaster webmaster | Monday, April 12, 2021, 9:46 AM Asia/Singapore | Sponsored, Whitepapers
Securing the next generation of digital transformation with HSMs.
Read MoreBy Thales and webmaster webmaster | Monday, March 1, 2021, 12:00 AM Asia/Singapore | Sponsored, Whitepapers
The company needed to comply with PCI-DSS to securely exchange data with customers and partners.
Read MoreBy Thales and webmaster webmaster | Monday, February 1, 2021, 1:29 PM Asia/Singapore | Sponsored, Whitepapers
The final piece of its security strategy puzzle was an encryption solution that could work seamlessly with both structured and unstructured data.
Read MoreBy Thales and webmaster webmaster | Tuesday, January 5, 2021, 12:18 PM Asia/Singapore | Sponsored, Whitepapers
Healthcare and recruitment data are some of the most sensitive information, and need special protection when exchanged and managed in the cloud.
Read MoreBy CybersecAsia editors and webmaster webmaster | Wednesday, October 14, 2020, 5:28 PM Asia/Singapore | News, Newsletter
If you know the enemy and know cyber defenses, you need not fear the result of a hundred cyberattacks.
Read MoreBy Thales and webmaster webmaster | Tuesday, August 25, 2020, 9:49 AM Asia/Singapore | Sponsored, Whitepapers
Securing sensitive data in a cost-effective manner is often one of the biggest challenges in processing payment transactions.
Securing payment transactions is serious business. Get it wrong and the consequences can be catastrophic in terms of financial loss and business reputation.
Read MoreBy Thales and webmaster webmaster | Tuesday, August 25, 2020, 9:45 AM Asia/Singapore | Sponsored, Whitepapers
Processes and technologies for digital identity offer multiple opportunities for impersonation and other attacks.
Digital identity presents a technical challenge because this process often involves proofing individuals over an open network, and always involves the authentication of individual subjects over an open network to access digital services.
Read MoreBy Thales and webmaster webmaster | Tuesday, August 25, 2020, 9:40 AM Asia/Singapore | Sponsored, Whitepapers
Demand for database encryption is growing – and growing more difficult.
Today’s enterprise security teams are being tasked with supporting a rapid expansion of database encryption use cases.
For today’s businesses, virtually every critical digital business asset ultimately makes it into corporate databases. Not surprisingly, these repositories often represent the most sought-after targets of malicious insiders and cyber attackers — and it’s a database compromise that tends to pose the most devastating strategic and financial penalties to victimized businesses.
Read MoreBy Thales and webmaster webmaster | Tuesday, August 25, 2020, 9:22 AM Asia/Singapore | Sponsored, Whitepapers
Managing encryption keys as a centralized service is essential to the integrity of any enterprise encryption system.
Many organizations operate multiple, independent encryption systems resulting in silos, which complicates key management and erodes security.
Read MoreBy Thales and webmaster webmaster | Tuesday, August 25, 2020, 9:19 AM Asia/Singapore | Sponsored, Whitepapers
How to ensure critical infrastructure and information are protected against quantum computer attacks.
The threat to public key cryptography from quantum computers is now a matter of “when”, not “if”.
We have only a limited amount of time to upgrade and protect systems that are vulnerable today, to authenticate applications that are sustained through SOTA updates and to transition complex infrastructure to ensure authentication and confidentiality of user identification.
Read MoreBy Singtel and webmaster webmaster | Tuesday, March 10, 2020, 9:36 AM Asia/Singapore | Cloud Security, Features, Sponsored
The rise of cloud computing and the ubiquity of mobile computing have combined to put SMEs at risk...
Read More
PARTICIPATE NOW |
|