Healthcare institutions to get 6 months of endpoin...
By CybersecAsia editors | Mar 26, 2020 | News, Newsletter | 0
Medical IoT devices running outdated Windows are v...
By CybersecAsia editors | Feb 24, 2020 | News, Newsletter | 0
What your industry doesn’t know can hurt you most
If you think cybercriminals are going after Asia Pacific’s financial services and government sectors rather than your industry, think again!
Read MoreHealthcare institutions to get 6 months of endpoint security software free
By CybersecAsia editors | Mar 26, 2020 | News, Newsletter
This is to protect medical equipment from hacks, ensure data availability, and also protect patient-data privacy during the pandemic. Endpoint...
Read MoreMedical IoT devices running outdated Windows are vulnerable: researchers
By CybersecAsia editors | Feb 24, 2020 | News, Newsletter
More than half of MioT devices remain susceptible to the BlueKeep, DejaBlue and other bugs despite security patches. Why? Following an opinion piece...
Read MoreWith great data power comes great cyber-responsibility
By Simon Davies, Vice President, APAC, Splunk | Feb 7, 2020 | Opinions
All the disruptive emerging technologies draw on data for their power, so we will need new paradigms of data infrastructure robustness. The next...
Read MoreLethal weapons: The slow and bumpy journey to tighter medical device security
By Taylor Armerding, Software Security Expert, Synopsys Integrity Group | Jan 17, 2020 | Opinions
Imagine having your wirelessly-controllable pacemaker or smart insulin-pen being hacked by criminals—and then knowing your hospital is helpless to...
Read MoreKaspersky raises alarm over increasing targeted attacks against pharmaceuticals
By CybersecAsia editors | Sep 7, 2019 | Cyberthreat Landscape, News, Security Awareness & Education, Software Development Lifecycle Security
Widely used EMR systems open wider entry points for hackers targeting hospitals. Global cybersecurity company Kaspersky revealed an alarming trend...
Read MoreHealthcare data – the new pot of gold
Digital transformation, powering advances in holistic healthcare yet exposing larger attack surface to malicious forces. The dark web facilitates...
Read More
Voters-draw
Gamification listing
PARTICIPATE NOW |
|
Vote Now -Placment
BB HTC
Top-Sidebar-banner
Whitepapers
eBook: Ransomware Deception Use Cases
Learn how Metallic ® ThreatWiseTM , from Commvault, can provide proactive and advanced data protectionDownload WhitepaperPost-Pandemic APAC Digital Transformation and OT Cyber Security
All you need to know about digital transformation and OT cybersecurity in Asia in the …Download WhitepaperFour Things to Consider to Successfully and Securely Run Critical Applications in the Cloud
Use this checklist to securely and successfully run critical applications in the cloud and maximize …Download WhitepaperCriteria Guide When Choosing An Endpoint Detection and Response (EDR) Solution
Use this checklist to make a more informed decision when choosing an endpoint detection and …Download Whitepaper
Middle-sidebar-banner
Case Studies
Grace implements Check Point solutions for comprehensive protection
A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read moreMaxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead moreCase Study: Metallic ® ThreatWiseTM Data Protection Use Cases
How Metallic ThreatWise helped customers across industriesRead more