Cybercrooks love AI too! Supercharged AI cyberattacks inevitable: research
By CybersecAsia editors | Apr 3, 2020 | News, Newsletter
While AI adoption chugs along in industries and government, cybercriminals have already weaponized it in preparation for massive global campaigns. A...
Read MoreStaying agile with hacker-powered security
By Rena Chua, Bug Bounty Advisor, HackerOne | Jan 23, 2020 | Opinions
As the saying goes, if you cannot beat the bad guys, hire them for good! Security teams are challenged by the radical shifts in software...
Read MoreThe modern approach to securing the “keys to the kingdom”
By Daniel Mountstephen, Regional Vice President, Centrify Asia Pacific & Japan | Oct 9, 2019 | Opinions
Identities are an organization’s most significant vulnerability. Trust no one, verify everyone. Remember Kevin, the kid from “Home Alone”? After...
Read More
Whitepapers
2020 Remote work-from-home cybersecurity report
How secure access solutions kept businesses running – and people and devices connected to the …Download WhitepaperCyberchat between Proficio and Splunk
Listen in as two experts discuss how CISOs and cybersecurity teams can better articulate the …Download WhitepaperData security predictions 2021
Zero Trust, ‘vishing’ and strategic approaches to a chaotic, rapidly evolving world.Download WhitepaperMDR checklist for your Splunk environment
Is your managed detection and response (MDR) service provider giving you the best security services …Download Whitepaper
Case Studies
Idaptive reduces complexity, increases security for NZ agricultural organization
Challenge: find a single sign-on solution to reduce complexity, minimize calls for password assistance, increase …Read moreAre we ready for the next big breach?
How organizations across various industries prevent breaches, get deep visibility to detect and stop threats …Read moreEmail Security Threat Report 2020
Email and collaboration platforms are the connective tissue of most businesses and organizations, where information …Read moreLeading Malaysian developer zeroes in on threats with LogRhythm
Full visibility and intelligent detection eliminate cybersecurity blind spots and reduce response time for UDA. …Read more