Healthcare institutions to get 6 months of endpoin...
By CybersecAsia editors | Mar 26, 2020 | News, Newsletter | 0
Insurance giant appoints startup to provide rebate...
By CybersecAsia editors | Mar 6, 2020 | News, Newsletter | 0
Another retrospective of 2019’s threat landscape
By CybersecAsia editors | Feb 25, 2020 | News, Newsletter | 0
What you need to know about OT security
By Victor Ng | Feb 5, 2021 | Features, Newsletter
Some things you need to know if you manage OT networks and are responsible for ICS/SCADA cybersecurity.
Read MoreHealthcare institutions to get 6 months of endpoint security software free
By CybersecAsia editors | Mar 26, 2020 | News, Newsletter
This is to protect medical equipment from hacks, ensure data availability, and also protect patient-data privacy during the pandemic. Endpoint...
Read MoreInsurance giant appoints startup to provide rebated cybersecurity services
By CybersecAsia editors | Mar 6, 2020 | News, Newsletter
With ransomware hitting a new corporate victim every 14 seconds or less, cybersecurity insurance can offer some peace of mind. According to...
Read MoreAnother retrospective of 2019’s threat landscape
By CybersecAsia editors | Feb 25, 2020 | News, Newsletter
If looking at the past helps prepare you for the present, here is another cybersecurity retrospective to boost your cyberpreparedness…...
Read MoreRansomware can now borrow a vulnerable driver to attack your system
By CybersecAsia editors | Feb 11, 2020 | News
This novel approach exploits vulnerabilities in legitimate Microsoft-co-signed drivers to compromise the kernel and then disarm any security...
Read MoreGuess which social media brand is a phishing favorite?
By CybersecAsia editors | Feb 11, 2020 | News
No prizes for guessing, but knowing the right answer to tighten phishing vigilance will be your reward! In a brand phishing attack, criminals try to...
Read MoreHave Windows 10 and Office 365 breached GDPR?
By CybersecAsia editors | Oct 24, 2019 | Data Privacy, Features, Opinions
Microsoft’s products, particularly its telemetry and data collection/sharing from Windows 10 and Office 365, may not comply with GDPR. The...
Read MoreApple’s $1M bug bounty an arms race for zero-days
By Taylor Armerding, Software Security Expert, Synopsys Integrity Group | Sep 19, 2019 | Opinions, Software Development Lifecycle Security, White, Black & Grey Hat Hackers
Apple have expanded its bug bounty program to all researchers to US$1 million top prize to turn black hats white. Apple is taking bug bounties to a...
Read More
Whitepapers
2020 Remote work-from-home cybersecurity report
How secure access solutions kept businesses running – and people and devices connected to the …Download WhitepaperCyberchat between Proficio and Splunk
Listen in as two experts discuss how CISOs and cybersecurity teams can better articulate the …Download WhitepaperData security predictions 2021
Zero Trust, ‘vishing’ and strategic approaches to a chaotic, rapidly evolving world.Download WhitepaperMDR checklist for your Splunk environment
Is your managed detection and response (MDR) service provider giving you the best security services …Download Whitepaper
Case Studies
Idaptive reduces complexity, increases security for NZ agricultural organization
Challenge: find a single sign-on solution to reduce complexity, minimize calls for password assistance, increase …Read moreAre we ready for the next big breach?
How organizations across various industries prevent breaches, get deep visibility to detect and stop threats …Read moreEmail Security Threat Report 2020
Email and collaboration platforms are the connective tissue of most businesses and organizations, where information …Read moreLeading Malaysian developer zeroes in on threats with LogRhythm
Full visibility and intelligent detection eliminate cybersecurity blind spots and reduce response time for UDA. …Read more