How can we rid the world of passwords? Here are se...
By L L Seow | May 4, 2023 | Features, Newsletter | 0
With super-accelerated cloud adoption comes the ne...
By CybersecAsia editors | Apr 7, 2023 | News, Newsletter | 0
This data breach bears many learning points for cy...
By CybersecAsia editors | Oct 3, 2022 | Newsletter, Tips | 0
Dealing with credential theft in a yet-to-be-passwordless world
Despite much talk about passwordless credentials, many organizations still depend on passwords for employee identity and access management.
Read MoreHow can we rid the world of passwords? Here are seven perspectives
By L L Seow | May 4, 2023 | Features, Newsletter
With countless cyber breaches originating from the exploitation of password-only authentication systems, is the world ready to take the next leap?
Read MoreWith super-accelerated cloud adoption comes the need for tighter security identity controls
By CybersecAsia editors | Apr 7, 2023 | News, Newsletter
One survey, however, is suggesting that the APAC/APJ region is not taking a mature or agile approach to this risk vector
Read MoreThis data breach bears many learning points for cyber defenders
By CybersecAsia editors | Oct 3, 2022 | Newsletter, Tips
Besides an initial infiltration through the supply chain, multifactor authentication failures and exposed hard-coded PAM admin credentials were glaring oversights
Read MoreHow prepared are you for the ransomcloud?
By Victor Ng | Jun 21, 2022 | Cloud Security, Features
Cybercriminals are targeting the cloud as organizations move more data into the cloud.
Read MoreSafety tips for scanning QR codes
By Len Noe, White Hat Hacker, CyberArk | Jun 10, 2022 | Features, Newsletter, Tips
Heard of the BeeF suite? Check out these 3 QR code attack simulations and 7 safety tips to mitigate QR code risks.
Read MorePrioritizing business growth over cybersecurity: a latent debt of existential consequences
By CybersecAsia editors | Apr 22, 2022 | Cyberthreat Landscape, News, Newsletter
Sidelining cybersecurity-boosting efforts in favor of profits and growth can lead to severe vulnerabilities that end up destroying a brand: survey
Read MoreDigitalization has escalate consumer expectations of data privacy: Deal with it!
By Carlo Cordova | Jan 31, 2022 | Newsletter, Tips
Organizations and governments are already in a trust drought from 2021’s spectacular cyberattacks: take action NOW to regain some public trust!
Read MoreAnother Singapore company suffers data breach linked to a third-party vendor
By CybersecAsia editors | Jan 10, 2022 | News
Details of how the breach occurred are scarce, but victims of the department store data leak must take immediate action.
Read MoreDo not forget these six Log4j cyber safeguards
By CybersecAsia editors | Dec 21, 2021 | Tips
Amid the rush to consult vendors and check and patch and test against the recently-announced Log4j, check out the following tips…
Read MoreInsider threats and credential theft can be detected and deterred: study
By CybersecAsia editors | Nov 5, 2021 | News, Newsletter
The question is why organizations continue to have limited visibility into user activity and access privileges.
Read MoreIDENTITY SECURITY IN THE HYBRID WORK & CLOUD ERA
By CybersecAsia editors | Oct 27, 2021 | Virtual Event
A virtual ‘fireside chat’ that offers valuable tips and strategies from identity security experts.
Read MoreThe new CISO mandate: protect DevOps!
By Victor Ng | Aug 21, 2021 | Features, Newsletter, Software Development Lifecycle Security
CISOs and security teams are playing a larger role in application security today. But is that a good idea?
Read MoreREvil ransomware attack on Kaseya: could this have been averted?
By Carlo Cordova | Jul 9, 2021 | Features, Newsletter
Four cyber-experts weigh in the zero-day exploit where “All your network has been locked. You have 10 days to contact us.”
Read MoreProtect your data! even Jeff Bezos and Elon Musk have been hacked
By Jeffrey Kok, Vice President, Solution Engineer, Asia Pacific & Japan, CyberArk | Jun 2, 2021 | Newsletter, Tips
Here are three tips to guide your organization’s data privacy and security policies amid hybrid work arrangements and raging cyberattacks.
Read MoreThe CISO view on zero trust
By CyberArk | Mar 30, 2021 | Infographic, Newsletter
With spear-phishing patterns shifting, CISOs are looking towards ‘zero trust’ models to cope.
Read MoreFrequent hackings of surveillance cameras are making people queasy
By L L Seow | Mar 16, 2021 | News, Newsletter
The latest breach involved 150,000 live cameras inside prisons, hospitals, schools and even police departments. In another demonstration of the...
Read MoreKnow the anatomy of the SolarWinds attack chain
By Lavi Lazarovitz, Head, Security Research, CyberArk | Mar 12, 2021 | Newsletter, Tips
Knowing thy enemy and his tactics, techniques and procedures can save thy data …
Read MoreNorth Korean hackers targeting security researchers
By CybersecAsia editors | Jan 27, 2021 | News, Newsletter
North Korean hackers use multiple profiles on various social networks to reach out to security researchers using fake personas.
Read MorePreparing for what’s next: Innovation also brings cybersecurity risk
By David Higgins, Technical Director, CyberArk | Aug 11, 2020 | Sponsored, Tips
Recent research has shown the various risks innovative workplace arrangements pose. Delivering strong security while at the same time not getting in...
Read More
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
BB HTC
Middle-sidebar-banner
Whitepapers
451 Research Business Analyst Report On Cloud Security Delivery
Learn what to choose between native and third-party when delivering cloud security.Download WhitepaperState of Email Security Report for 2023
Mimecast’s seventh annual State of Email Security report comes as organisations all over the world …Download WhitepaperGartner Report on Choosing the Right Key Management as a Service
Learn how to mitigate your organization’s cloud data security and privacy risks.Download WhitepaperThe Next-Gen CSPM Buyer’s Guide
All you need to know about choosing your next-generation CSPM.Download Whitepaper
Case Studies
Mastercard ramps up fraud protection for e-commerce merchants with Vesta
Tie-up offers Mastercard Payment Gateway Services customers access to Vesta’s Payment Guarantee and Payment Protect …Read moreSome Q1 2023 DDoS trends point to hackers changing tack
They are now quicker to abandon unsuccessful attacks while beefing up campaigns on non-traditional targets, …Read morePharma firm reaps efficiency benefits after outgrowing network attached storage
By upgrading to a cloud-based and integrated data protection-and-cybersecurity platform, BDR Pharmaceuticals was finally exceeding …Read moreNTT Ltd expects to save US$5m annually after successful cloud migration test case
The firm recognizes that strong growth has led to inefficiencies and complexities that need to …Read more