Mobile services provider to build 5G-ready cloud-n...
By CybersecAsia editors | Apr 17, 2020 | News, Newsletter | 0
Mounting cyberattacks and disruptive events affect...
By CybersecAsia editors | Apr 2, 2020 | Data Protection, News, Newsletter | 0
Why should 5G implementation not be rushed? Here are three macro-level insights
By L L Seow | Feb 24, 2021 | Newsletter, Tips
The security risks of rushed 5G implementation can potentially overshadow the technology’s promises: we all need a 5G sanity check.
Read MoreMobile services provider to build 5G-ready cloud-native mobile network
By CybersecAsia editors | Apr 17, 2020 | News, Newsletter
What they needed were tools for testing and validation to speed up the roll-out of 5G services to subscribers. Rakuten Mobile, a group company of...
Read MoreMounting cyberattacks and disruptive events affecting 84% of organizations: APJ survey
By CybersecAsia editors | Apr 2, 2020 | Data Protection, News, Newsletter
Organizations using more than one data protection vendor were almost four times more vulnerable to a cyber incident. Organizations in the Asia...
Read MoreBalancing the promises and security threats of 5G and IoT
By Jeffrey Kok, Vice President, Solution Engineer, Asia Pacific & Japan, CyberArk | Apr 1, 2020 | Newsletter, Opinions
The key to protecting the new critical infrastructures lies in the protection of privileged access, says this PAM expert. High-speed 5G networks and...
Read More5 APAC cybersecurity issues looming large on the horizon
By CybersecAsia editors | Feb 21, 2020 | Features, Newsletter
From 2019’s cyberthreat trends, we know threat actors are eyeing our region for even more ambitious attacks to come. With developed countries in...
Read MoreWill the complexities of 5G security destroy its potential?
By Satish Dhanasekaran, SVP and President, Communications Solutions Group, Keysight Technologies | Feb 19, 2020 | Newsletter, Opinions
5G networks are incredibly complex, and the deployment of infrastructure elements at the edge makes them more difficult to secure. The mobile...
Read MoreWith great data power comes great cyber-responsibility
By Simon Davies, Vice President, APAC, Splunk | Feb 7, 2020 | Opinions
All the disruptive emerging technologies draw on data for their power, so we will need new paradigms of data infrastructure robustness. The next...
Read MoreA battle royale for data exchange protocols in connected vehicles
By Dan Murdock, Chief Architect, Connected Transport, Irdeto | Feb 3, 2020 | Opinions
The race among LTE, Wifi, 5G and DSRC to dominate connectivity protocols rages on, but security is still the top priority. The volume of data on...
Read MoreReadying our security arsenals for 5G and IoT
Cybersecurity plays a critical role in enabling new advancements like 5G and IoT, as it works toward protecting the value and innovation they bring....
Read MoreForcepoint predicts 2020 cybersecurity threats arising from deepfakes, 5G, and adoption of public cloud
By CybersecAsia editors | Nov 27, 2019 | Cyberthreat Landscape, Features
Human beings being the weakest link in cybersecurity, better understanding of users’ interaction with critical data and systems must become part of...
Read MoreA double-edged sword: transparency and privacy in a data-driven world
By Ada Xiao, Chief Strategy Officer, PlatON | Sep 26, 2019 | Data Privacy, Opinions
Both transparency and data privacy must be prioritized by businesses. Is blockchain the solution? The rise of globalization has facilitated...
Read MoreIoT a hot topic in the cybercriminal underground
By CybersecAsia editors | Sep 17, 2019 | Cyber Intelligence, Cyberthreat Landscape, News
Trend Micro's global underground analysis reveals increased monetization of IoT attacks.
Read MoreSecuring 5G and IoT: software-defined zero-trust
By L L Seow and Victor Ng | Aug 30, 2019 | Cloud Security, Cybersecurity Strategies, Features, Mobile Security
High speed wireless connections and devices are redefining the digital landscape, and the zero-trust cybersecurity paradigm must keep up. The...
Read MoreTokyo 2020: Olympics with all the smarts
By L L Seow and Victor Ng | Aug 27, 2019 | Cyber Warfare, Cyber-terrorism, Features
As the Olympic Games 2020 approaches, Tokyo wants to demonstrate its cyber mettle to the world. But what about cybersecurity? When Tokyo hosts the...
Read More
Voters-draw
Gamification listing
PARTICIPATE NOW |
|
Vote Now -Placment
BB HTC
Top-Sidebar-banner
Whitepapers
eBook: Ransomware Deception Use Cases
Learn how Metallic ® ThreatWiseTM , from Commvault, can provide proactive and advanced data protectionDownload WhitepaperPost-Pandemic APAC Digital Transformation and OT Cyber Security
All you need to know about digital transformation and OT cybersecurity in Asia in the …Download WhitepaperFour Things to Consider to Successfully and Securely Run Critical Applications in the Cloud
Use this checklist to securely and successfully run critical applications in the cloud and maximize …Download WhitepaperCriteria Guide When Choosing An Endpoint Detection and Response (EDR) Solution
Use this checklist to make a more informed decision when choosing an endpoint detection and …Download Whitepaper
Middle-sidebar-banner
Case Studies
Grace implements Check Point solutions for comprehensive protection
A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read moreMaxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead moreCase Study: Metallic ® ThreatWiseTM Data Protection Use Cases
How Metallic ThreatWise helped customers across industriesRead more