Smart buildings and power grids are sitting ducks ...
By Samrita Baruah, IMAWS | Aug 4, 2022 | Features, Newsletter | 0
Fortinet’s zero-trust security boosts innova...
By Fortinet | Mar 23, 2022 | Case Study, IoT Security, Sponsored | 0
Is your organization about to step into the DarkSi...
By L L Seow | Jun 21, 2021 | Newsletter, Tips | 0
Threats on critical infrastructure, ICS will escalate in 2023 with geopolitical activity
By Evgeny Goncharov, Head of ICS, Kaspersky | Nov 24, 2022 | Newsletter, Tips
Increasing use of IIoT and automation of industrial control systems and operational technology exposes such infrastructures to all-round risks
Read MoreSmart buildings and power grids are sitting ducks due to poor vulnerability management
By Samrita Baruah, IMAWS | Aug 4, 2022 | Features, Newsletter
The convergence of operational technology with digital transformation has neglected cybersecurity as priority even now, as a recent incident shows
Read MoreFortinet’s zero-trust security boosts innovation development of automotive manufacturing industry
By Fortinet | Mar 23, 2022 | Case Study, IoT Security, Sponsored
How automotive manufacturers can leverage the zero-trust approach to secure operational technology.
Read MoreIs your organization about to step into the DarkSide?
By L L Seow | Jun 21, 2021 | Newsletter, Tips
Miss out on any of the six items on the ransomware-resilience checklist and risk facing a US$30m ransom plus disclosure extortion!
Read MoreBadalloc vulnerability in OT and IoT domains exposed
By CybersecAsia editors | May 5, 2021 | News, Newsletter
This is a significant potential risk for medical, industrial and enterprise networks fully vested in ‘smart’ devices and gadgets.
Read MoreWhat you need to know about OT security
By Victor Ng | Feb 5, 2021 | Features, Newsletter
Some things you need to know if you manage OT networks and are responsible for ICS/SCADA cybersecurity.
Read MoreHow an ICS attacks can bring down an international airport, but did not
By L L Seow | Oct 15, 2020 | Features, Newsletter
In a battle of wits and speed, pentest attackers can triumph over human defenders unless an AI nemesis is the gatekeeper …
Read MoreThe greatest threat to industrial cybersecurity may actually be red tape!
By CybersecAsia editors | Sep 29, 2020 | Newsletter, Tips
Find out what OT organizations can do to clean up their act before a massive attack takes place.
Read MoreSharp rise in remotely-exploitable Industrial Control Systems (ICS) Vulnerabilities detected
By CybersecAsia editors | Aug 20, 2020 | News, Newsletter
This includes over 70% of 365 ICS flaws published in the National Vulnerability Database for the first half of 2020: Report. More than 70% of industrial control system (ICS) vulnerabilities...
Read MoreSingapore power company hardens its industrial cybersecurity defenses
By CybersecAsia editors | Apr 7, 2020 | News, Newsletter
Operational technology companies such as those in the energy sector are required to harden cybersecurity without operational lapses or downtime. As...
Read MoreHub for Operational Technology protection wins a powerful ally
By CybersecAsia editors | Mar 19, 2020 | News, Newsletter
A new partnership facilitates the onboarding of Secure Remote Access capabilities and new avenues of OT intelligence info. The increasing...
Read MoreAbsolute power corrupts, but zero power disrupts absolutely
By Eddie Stefanescu, Regional VP Business, Asia Pacific & Japan, Claroty | Feb 26, 2020 | Opinions
Power generation plants and similar Operational Technologies are in jeopardy. Resolute preemptive measures and plans were needed yesterday. Over the...
Read MoreIran is ready for a cyber-rage! Are you ready for it?
We interview a top-rated cyber-resiliency firm for ways businesses can stay vigilant and proactively resistant to state-sponsored attacks. Last...
Read MoreLethal weapons: The slow and bumpy journey to tighter medical device security
By Taylor Armerding, Software Security Expert, Synopsys Integrity Group | Jan 17, 2020 | Opinions
Imagine having your wirelessly-controllable pacemaker or smart insulin-pen being hacked by criminals—and then knowing your hospital is helpless to...
Read More2019 was a glorious year for malicious actors
By CybersecAsia editors | Dec 3, 2019 | Cyber Espionage, Cyber Warfare, Cyberthreat Landscape, Features
A report on high-tech crime trends shows up 2019’s alarming growth of state-sponsored threats and other innovative attack vectors coming our way....
Read MoreGlobal Resilience Federation partners first Singapore cybersecurity company
By CybersecAsia editors | Dec 2, 2019 | News
Group-IB has become the first Singapore-based cybersecurity company to join Global Resilience Federation in protecting Singapore and therefore all...
Read MoreProtecting operational technology requires public-private synergies
It takes two hands to clap when protecting critical utilities such as the national energy grid and water sanitation system. Watch enough blockbuster...
Read More
Voters-draw
Gamification listing
PARTICIPATE NOW |
|
Vote Now -Placment
BB HTC
Top-Sidebar-banner
Whitepapers
eBook: Ransomware Deception Use Cases
Learn how Metallic ® ThreatWiseTM , from Commvault, can provide proactive and advanced data protectionDownload WhitepaperPost-Pandemic APAC Digital Transformation and OT Cyber Security
All you need to know about digital transformation and OT cybersecurity in Asia in the …Download WhitepaperFour Things to Consider to Successfully and Securely Run Critical Applications in the Cloud
Use this checklist to securely and successfully run critical applications in the cloud and maximize …Download WhitepaperCriteria Guide When Choosing An Endpoint Detection and Response (EDR) Solution
Use this checklist to make a more informed decision when choosing an endpoint detection and …Download Whitepaper
Middle-sidebar-banner
Case Studies
Grace implements Check Point solutions for comprehensive protection
A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read moreMaxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead moreCase Study: Metallic ® ThreatWiseTM Data Protection Use Cases
How Metallic ThreatWise helped customers across industriesRead more