Secure SD-WAN: the launch pad into cloud
By Barracuda | Jul 22, 2020 | Barracuda Articles, Sponsored, Whitepapers | 0
Cloud Trends Report
By Skybox Security | Apr 21, 2020 | Sponsored, Whitepapers | 0
2020 vulnerability and threat trends-mid-year update
By Skybox Security | Aug 11, 2020 | Sponsored, Whitepapers
Mid-year update with data from January to June 2020, taking into account the COVID-19 pandemic situation. The COVID-19 crisis has made a significant impact on the cybersecurity landscape. Existing challenges...
Read MoreSecure SD-WAN: the launch pad into cloud
By Barracuda | Jul 22, 2020 | Barracuda Articles, Sponsored, Whitepapers
SD-WAN is the preferred technology solution to secure cloud deployments for most global organizations. In January 2020, Barracuda commissioned independent market researcher Vanson Bourne to conduct a global survey of...
Read MoreCloud Trends Report
By Skybox Security | Apr 21, 2020 | Sponsored, Whitepapers
With possibly 83% of enterprise workloads running on public cloud infrastructure before 2020 is over, visibility of cloud services is one of the biggest issues facing security teams today.
Read MoreCloud security begins and ends in the boardroom
By Myles Hosford, Head of Security Architecture, ASEAN, Amazon Web Services | Apr 21, 2020 | Cloud Security, Newsletter, Opinions
C-suite executives need to keep all ears to the ground in order to formulate and manage security and compliance well. Members of the C-suite are...
Read More2020 Vulnerability & Threat Trends Report
By Skybox Security | Apr 21, 2020 | Sponsored, Whitepapers
The number of new vulnerabilities reported every year can be overwhelming, and your defense strategy can benefit from the perspective of trends shaping the vulnerability and threat landscape.
Read MoreLogRhythm Named a Leader in 2020 Gartner SIEM Magic Quadrant
By LogRhythm | Apr 20, 2020 | Case Study, Sponsored
In the 2020 Magic Quadrant for Security Information and Event Management (SIEM), Gartner evaluated LogRhythm and 15 other vendors for completeness of vision and ability to execute. For the eighth...
Read MoreThe LogRhythm Security Operations Maturity Model
By LogRhythm | Apr 20, 2020 | Sponsored, Whitepapers
Learn How to Assess and Improve Your Organization’s Security Operations Maturity. Now a days, Sophisticated cyber-attackers are compromising organizations at an unprecedented rate — and with devastating and costly consequences.
Read MoreMobile services provider to build 5G-ready cloud-native mobile network
By CybersecAsia editors | Apr 17, 2020 | News, Newsletter
What they needed were tools for testing and validation to speed up the roll-out of 5G services to subscribers. Rakuten Mobile, a group company of...
Read MoreAn immune system for cloud security
By Darktrace | Apr 8, 2020 | Case Study, Cloud Security
As organizations increase their digital capabilities across hybrid, multi-cloud and IoT environments, they’re faced with more areas to protect and control.
Read MoreWhy corporate data compliance can make or break an enterprise
By Victor Ng | Apr 7, 2020 | Data Protection, Features, Newsletter
With the growing need to improve data governance and corporate data compliance, what should organizations pay most attention to? According to Micro...
Read MoreFour data security megatrends you need to know for the decade ahead
By Saravanan Krishnan, General Manager, Data Protection Solutions, South Asia, Dell Technologies | Apr 3, 2020 | Data Protection, Features, Newsletter, Opinions
The exponential growth of data value and volume means that enterprise survival hinges on obsessing over its use and protection. Over the past year,...
Read MoreMounting cyberattacks and disruptive events affecting 84% of organizations: APJ survey
By CybersecAsia editors | Apr 2, 2020 | Data Protection, News, Newsletter
Organizations using more than one data protection vendor were almost four times more vulnerable to a cyber incident. Organizations in the Asia...
Read MoreDungeons & Dragons maker opts for frictionless development solution
By CybersecAsia editors | Apr 2, 2020 | News, Newsletter
With its online gaming platform built on AWS, the developer needed frictionless security for cloud development and production flows. Games developer...
Read MoreHealthcare institutions to get 6 months of endpoint security software free
By CybersecAsia editors | Mar 26, 2020 | News, Newsletter
This is to protect medical equipment from hacks, ensure data availability, and also protect patient-data privacy during the pandemic. Endpoint...
Read MoreCloud security concerns are shifting upwards: are you prepared for the change?
By Dr. Lee Hing Yan, Executive Vice President, APAC, Cloud Security Alliance | Mar 24, 2020 | Cloud Security, Newsletter, Opinions
Just as clouds in the sky are not static, neither are the urgent security concerns of Cloud computing, this expert says. The adoption of cloud...
Read MoreTransition quickly to secure remote-working with this free enterprise software
By CybersecAsia editors | Mar 20, 2020 | News, Newsletter
The secure hosted cloud solution can help eligible service providers to set up a virtual working office until end-July 2020. In an altruistic...
Read MoreWorry-free endpoint protection for SMEs
By Singtel | Mar 10, 2020 | Cloud Security, Features, Sponsored
The rise of cloud computing and the ubiquity of mobile computing have combined to put SMEs at risk of security and data breaches, as endpoints widen...
Read MorePoor security hygiene leads to escalating cloud vulnerabilities: report
By CybersecAsia editors | Feb 7, 2020 | News
As organizations rush to automate more of their cloud infrastructure build processes, they need to brush up on cyber hygiene. Organisations that...
Read MoreData is widely dispersed in the cloud beyond most enterprise control: report
By CybersecAsia editors | Feb 4, 2020 | News
Thousands of data loss incidents occur monthly in the cloud, heightening the risk of sensitive data loss or regulatory non-compliance. A new...
Read MoreFour steps to better cyber-protection in 2020
By Jeff Costlow, Deputy Chief Information Security Officer, ExtraHop | Jan 8, 2020 | Opinions
Businesses in APAC are particularly vulnerable due to the IT talent crunch. Here are an expert’s recommendations for tightening cybersecurity....
Read More
Voters-draw
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
BB HTC
News
Middle-sidebar-banner
Whitepapers
A SANS Survey: Rethinking the Sec in DevSecOps: Security as Code
List of the top AppSec trends and interesting new innovations in 2022.Download WhitepaperDevelopers Guide: Top 10 OWASP API Security Issues
A developer’s technical guide to the top 10 Open Web Application Security Project (OWASP) API …Download WhitepaperConversational Microsoft 365 Data Backup
All you need to know about conversation Microsoft 365 data backup and recoveryDownload WhitepaperThe Global Enterprise Authentication Practices
Learn the global enterprise authentication practices in this Yubico survey research in partnership with Censuswide.Download Whitepaper
More News
Case Studies
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & Access Management
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & …Read moreGrace implements Check Point solutions for comprehensive protection
A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read moreMaxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead more