Fighting industrialization of cybercrime requires ...
By CybersecAsia editors | Sep 16, 2022 | News, Newsletter | 0
With the US midterms around the corner, watch out ...
By CybersecAsia editors | Sep 9, 2022 | News, Newsletter | 0
Simpler and stronger multi-device passwordless aut...
By FIDO Alliance | May 10, 2022 | Infographic, Newsletter | 0
Two recent zero day vulnerabilities affecting Microsoft Exchange not exploited yet?
By CybersecAsia editors | Oct 7, 2022 | News, Newsletter
At least in one cybersecurity firm’s user base, the ProxyShell-like vulnerability is unexploited; but prompt patches have not been released either
Read MoreFighting industrialization of cybercrime requires public-private resolve: threat brief
By CybersecAsia editors | Sep 16, 2022 | News, Newsletter
Ransomware-as-a-service has become big bad business, and global threat intelligence needs to beefed up to put cyber crooks out of business
Read MoreWith the US midterms around the corner, watch out for APT42
By CybersecAsia editors | Sep 9, 2022 | News, Newsletter
The Iran-linked threat group possibly targeted US election campaign staff in 2019 and 2020, and it will not stop there …
Read MoreSimpler and stronger multi-device passwordless authentication
By FIDO Alliance | May 10, 2022 | Infographic, Newsletter
Faster, easier and more secure sign-ins across leading devices and platforms, using FIDO credentials.
Read MoreWhy spear phish a CEO when you can attack a sales manager?
By CybersecAsia editors | Aug 5, 2021 | News, Newsletter
Vigilance around a chief executive’s mailbox will be high, so target a manager and work up the chain of command …
Read MoreNew FIDO updates and UX specifications set to encourage a passwordless future
By CybersecAsia editors | Jun 28, 2021 | News, Newsletter
Amid widespread support for WebAuthn and CTAP components of FIDO2 in browsers and operating systems, this major push can accelerate adoption.
Read MoreNew APAC coalition forms to promote public-private tech resilience against cybercrime
By CybersecAsia editors | Jun 2, 2021 | News, Newsletter
15 policy makers and private technology agencies have been banded together to achieve herd-immunity against incessant cyberattacks in the region.
Read MoreOut with the password: multifactor authentication is in
By Alex Wilson, Director, Solutions Engineering, APJ, Yubico | Jun 2, 2021 | Newsletter, Opinions
Passwords are becoming irrelevant, but replacing them requires open protocols rather than closed systems, opines this authentication technology expert.
Read MoreWhat you need to know about OT security
By Victor Ng | Feb 5, 2021 | Features, Newsletter
Some things you need to know if you manage OT networks and are responsible for ICS/SCADA cybersecurity.
Read MoreHealthcare institutions to get 6 months of endpoint security software free
By CybersecAsia editors | Mar 26, 2020 | News, Newsletter
This is to protect medical equipment from hacks, ensure data availability, and also protect patient-data privacy during the pandemic. Endpoint...
Read MoreInsurance giant appoints startup to provide rebated cybersecurity services
By CybersecAsia editors | Mar 6, 2020 | News, Newsletter
With ransomware hitting a new corporate victim every 14 seconds or less, cybersecurity insurance can offer some peace of mind. According to...
Read MoreAnother retrospective of 2019’s threat landscape
By CybersecAsia editors | Feb 25, 2020 | News, Newsletter
If looking at the past helps prepare you for the present, here is another cybersecurity retrospective to boost your cyberpreparedness…...
Read MoreRobbinhood Ransomware borrow a vulnerable driver to attack your system
By CybersecAsia editors | Feb 11, 2020 | News
This novel approach exploits vulnerabilities in legitimate Microsoft-co-signed drivers to compromise the kernel and then disarm any security...
Read MoreGuess which social media brand is a phishing favorite?
By CybersecAsia editors | Feb 11, 2020 | News
No prizes for guessing, but knowing the right answer to tighten phishing vigilance will be your reward! In a brand phishing attack, criminals try to...
Read MoreHave Windows 10 and Office 365 breached GDPR?
By CybersecAsia editors | Oct 24, 2019 | Data Privacy, Features, Opinions
Microsoft’s products, particularly its telemetry and data collection/sharing from Windows 10 and Office 365, may not comply with GDPR. The...
Read MoreApple’s $1M bug bounty an arms race for zero-days
By Taylor Armerding, Software Security Expert, Synopsys Integrity Group | Sep 19, 2019 | Opinions, Software Development Lifecycle Security, White, Black & Grey Hat Hackers
Apple have expanded its bug bounty program to all researchers to US$1 million top prize to turn black hats white. Apple is taking bug bounties to a...
Read More
Voters-draw
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
BB HTC
News
Middle-sidebar-banner
Whitepapers
Conversational Microsoft 365 Data Backup
All you need to know about conversation Microsoft 365 data backup and recoveryDownload WhitepaperThe Global Enterprise Authentication Practices
Learn the global enterprise authentication practices in this Yubico survey research in partnership with Censuswide.Download WhitepaperModern Identity Security For Stronger Defense
All you need to know about the requirements, features, and benefits of achieving Modern Identity …Download WhitepaperSecure the Application Journey Towards Digital Acceleration
Learn how to apply consistent security policies and controls to secure digital transformation across clouds …Download Whitepaper
More News
Case Studies
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & Access Management
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & …Read moreGrace implements Check Point solutions for comprehensive protection
A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read moreMaxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead more