Top three cyber risks to watch out for next year
By CybersecAsia editors | Dec 27, 2019 | Cyberthreat Landscape, Opinions, Security Trends & Developments
Spoiler alert — the risks involve deepfakes, machine identities and the false sense of cloud security many businesses still have. Over the...
Read MoreFour key benefits of Isolation Security for your business
By Stephanie Boo, Vice President, Asia Pacific, Menlo Security | Nov 5, 2019 | Opinions, Security Awareness & Education, Security Trends & Developments, Website Protection
Web security teams can use a cloud-based browser isolation service to avoid bothering over what active content to filter out. The internet is a...
Read MoreCybersecurity in the automotive industry
By Victor Ng | Aug 28, 2019 | Cyberthreat Landscape, Features, IoT Security, Security Trends & Developments, Software Development Lifecycle Security
How safe and secure are smart, connected and driverless cars? What are the cybersecurity concerns the automotive industry needs to pay attention to?
Read MoreFortinet’s regional security conferences to focus on security-driven network strategies
By CybersecAsia editors | Aug 22, 2019 | Network & Infrastructure Security, News, Security Awareness & Education, Security Trends & Developments
Fortinet has announced that the annual Fortinet 361° Security conference is once again taking place this year across multiple cities in South East...
Read MoreThe five most dangerous new attack techniques and how to counter them
By RSA Conference | Aug 22, 2019 | Cybersecurity Strategies, Cyberthreat Landscape, Security Awareness & Education, Security Trends & Developments, Video
Featuring: Nick Klein, Director of Klein & Co. Computer Forensics, SANS Certified InstructorRobert M. Lee, CEO and Founder, Dragos, Inc., SANS...
Read MoreCybersecurity Futures 2025: Insights and Findings for RSAC
By RSA Conference | Aug 20, 2019 | Opinions, Security Trends & Developments, Video
How will digital geopolitics drive transnational realignments and industrial policy in the future? Where will the greatest cybersecurity...
Read More
Voters-draw
Thales Gamification
Gamification listing
PARTICIPATE NOW |
|
Vote Now -Placment
BB HTC
Top-Sidebar-banner
Whitepapers
Post-Pandemic APAC Digital Transformation and OT Cyber Security
All you need to know about digital transformation and OT cybersecurity in Asia in the …Download WhitepaperFour Things to Consider to Successfully and Securely Run Critical Applications in the Cloud
Use this checklist to securely and successfully run critical applications in the cloud and maximize …Download WhitepaperCriteria Guide When Choosing An Endpoint Detection and Response (EDR) Solution
Use this checklist to make a more informed decision when choosing an endpoint detection and …Download WhitepaperCyber Threat Predictions for 2023 by FortiGuard Labs
Learn the cyber threat predictions in 2023 in this annual perspective by FortiGuard Labs.Download Whitepaper
Middle-sidebar-banner
Case Studies
Maxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead moreFortinet Security Fabric Protects Yedpay’s New Cloud Environment
Yedpay Power Its Business Growth with Fortinet Security FabricRead moreCase Studies: 1.5 million lessons from the SingHealth hack
Learn the lessons from this post-mortem of a healthcare information hackRead more