How to be more secure with containers
By Victor Ng | Dec 4, 2019 | Features, Software Development Lifecycle Security | 0
Time pressure leading to vulnerable apps
By Victor Ng | Sep 30, 2020 | Features, Newsletter, Software Development Lifecycle Security
Time pressure opens several areas of vulnerabilities in organizations’ software development lifecycle security.
Read MoreIdentifying security vulnerabilities without impacting workflow
By Synopsys | Jan 14, 2020 | Case Study, Software Development Lifecycle Security
In this case study done by Synopsys with El Al Israel Airlines, we show how the airline incorporated an application security testing solution that...
Read MoreHow to be more secure with containers
By Victor Ng | Dec 4, 2019 | Features, Software Development Lifecycle Security
While containers ensure separation in the application development lifecycle for security, how do we secure the platform itself? The endless quest...
Read MoreVulnerability exposes more than 10,000 Xiaomi smart pet feeders
By CybersecAsia editors | Oct 30, 2019 | IoT Security, News, Software Development Lifecycle Security
Feeding schedules and safety of pets at risk if hackers exploit this vulnerability, as well as exploit it for IoT attacks. A Russian security...
Read MoreDevSecOps: Making security by design real
By Shahnawaz Backer, Principal Security Advisor, APCJ, F5 Networks | Sep 25, 2019 | Digital Transformation, Opinions, Software Development Lifecycle Security
How does DevSecOps fit in the DevOps world, where security can impede speed?
Read MoreApple’s $1M bug bounty an arms race for zero-days
By Taylor Armerding, Software Security Expert, Synopsys Integrity Group | Sep 19, 2019 | Opinions, Software Development Lifecycle Security, White, Black & Grey Hat Hackers
Apple have expanded its bug bounty program to all researchers to US$1 million top prize to turn black hats white. Apple is taking bug bounties to a...
Read MoreKaspersky raises alarm over increasing targeted attacks against pharmaceuticals
By CybersecAsia editors | Sep 7, 2019 | Cyberthreat Landscape, News, Security Awareness & Education, Software Development Lifecycle Security
Widely used EMR systems open wider entry points for hackers targeting hospitals. Global cybersecurity company Kaspersky revealed an alarming trend...
Read MoreCybersecurity in the automotive industry
By Victor Ng | Aug 28, 2019 | Cyberthreat Landscape, Features, IoT Security, Security Trends & Developments, Software Development Lifecycle Security
How safe and secure are smart, connected and driverless cars? What are the cybersecurity concerns the automotive industry needs to pay attention to?
Read More

Whitepapers
Webinar: Best practices for critical event management
Join this on-demand presentation to learn how organizations are leveraging AtHoc to plan, prepare and …Download WhitepaperWebinar: Best practices for teleworkers at scale
Learn how your organization could more effectively provision network bandwidth, support and security for your …Download WhitepaperMaximize the ROI of detection and response
Cut costs by 44% by consolidating tools and streamlining operations for cyber-threat detection and response.Download WhitepaperHealthcare organization addresses cloud access management challenges
Healthcare and recruitment data are some of the most sensitive information, and need special protection …Download Whitepaper
More News
Case Studies
Are we ready for the next big breach?
How organizations across various industries prevent breaches, get deep visibility to detect and stop threats …Read moreIdaptive reduces complexity, increases security for NZ agricultural organization
Challenge: find a single sign-on solution to reduce complexity, minimize calls for password assistance, increase …Read moreEmail Security Threat Report 2020
Email and collaboration platforms are the connective tissue of most businesses and organizations, where information …Read moreLeading Malaysian developer zeroes in on threats with LogRhythm
Full visibility and intelligent detection eliminate cybersecurity blind spots and reduce response time for UDA. …Read more