Decline in mobile malware in South-east Asia, but ...
By CybersecAsia editors | Jun 17, 2022 | Cyberthreat Landscape, Mobile Security, Newsletter, Tips | 0
Is your EDR solution holistic or myopic?
By Steven Gan, Country Manager, SEA, Qualys | Jun 10, 2022 | Newsletter, Tips | 0
Transactional fraud and abuse: are they the same?
By Joe Lee, Forter | Jun 23, 2022 | Newsletter, Tips
Here are some tips to differentiate the two forms of policy abuse, in order to optimize customer relationship and business outcomes
Read MoreBeing an SME is the low hanging fruit that supply chain attackers love
By Teong Eng Guan, Regional Director, Southeast Asia and Korea, Check Point Software Technologies | Jun 20, 2022 | Newsletter, Tips
No more budget excuses and procrastination—small and medium-sized enterprises can become zero-sized tomorrow—unless these critical cyber tips are heeded.
Read MoreDecline in mobile malware in South-east Asia, but hackers show growing sophistication
By CybersecAsia editors | Jun 17, 2022 | Cyberthreat Landscape, Mobile Security, Newsletter, Tips
Despite a decrease in the number of attacks, users should not be letting their guard down, Kaspersky warns.
Read MoreIs your EDR solution holistic or myopic?
By Steven Gan, Country Manager, SEA, Qualys | Jun 10, 2022 | Newsletter, Tips
Understand why traditional point-based EDR products have failed to catch the bad code, and how a holistic, preventative approach is better
Read MoreSafety tips for scanning QR codes
By Len Noe, White Hat Hacker, CyberArk | Jun 10, 2022 | Features, Newsletter, Tips
Heard of the BeeF suite? Check out these 3 QR code attack simulations and 7 safety tips to mitigate QR code risks.
Read MoreSix questions to ask when shopping for cyber insurance
By Geoff Schomburgk, Vice President, Asia Pacific and Japan, Yubico | Jun 3, 2022 | Sponsored, Tips
Cyber insurance premiums skyrocketed with the evolving cyber-threat landscape. What can companies do before signing up for a policy?
Read MoreRisk scoring: Turning cyber unpredictability into a competitive advantage
By Michel Feijen, Managing Director, APAC, MetricStream | Jun 1, 2022 | Newsletter, Tips
Whichever firm that quantifies risks in a way that leads to the smartest cyber investments enjoys boosted business resilience and cyber-agility.
Read MoreEnforcing Zero Trust with escalating non-human identities
By Chern-Yue Boey, Senior Vice President, APAC, SailPoint | May 31, 2022 | Newsletter, Tips
Going back to ZTA basics, we are reminded of three core strategies revolving around identity and privileged access management.
Read MoreElevating cyber risk conversations to the boardroom
By Ben King, Vice President, Customer Trust, Okta | May 25, 2022 | Most Read2, Newsletter, Sponsored, Tips
Supply chain attacks highlight the criticality of third-party risk management, and cyber risk conversations in the boardroom is now more important...
Read MoreSeven ways to keep safe in the ‘new internet’
By CybersecAsia editors | May 24, 2022 | Newsletter, Tips
Spectacular cyber heists from NFTs, crypto exchanges and all things new in the blockchain evolution require extreme cyber diligence and paranoia
Read MoreYour business may be small, but these cyber tips can keep your data safe
By CybersecAsia editors | May 20, 2022 | Newsletter, Tips
With constant surges in cyber threats targeting SMEs, firms that have been neglecting tightening cybersecurity can benefit from the following tips.
Read MoreThree ways to fortify your security strategy amid increasing infrastructural complexity
By Lucas Salter, General Manager, Data Protection Solutions, APJ, Dell Technologies | May 17, 2022 | Newsletter, Tips
With the cyber threat landscape complicated by laggard regulatory pressures and cyber complacence, it is time to go back to basics.
Read MoreName three hurdles to zero trust adoption, then accept no excuses
By Daniel Kwong, Field Chief Information Security Officer, SEA and Hong Kong, Fortinet | May 16, 2022 | Newsletter, Tips
APAC was probably the most-attacked region last year (for a wealth of reasons). Time for zero trust adoption to take root!
Read MoreThese five password hygiene tips are perennial and not just for World Password Day
By CybersecAsia editors | May 6, 2022 | Newsletter, Tips
Some practices are so critical now, that they can no longer be nudged onto people just for one day/week a year.
Read MoreInvest in cyber insurance or divert the outlay to boost cybersecurity instead?
By Jennifer Tiang, Regional Cyber Leader, Asia, WTW | Apr 29, 2022 | Newsletter, Tips
Uninsured organizations thinking of either alternatives may be missing the bigger picture here. Find out why.
Read MoreLearn the indicators of insider threats
By Zac Amos | Apr 28, 2022 | Most Read1, Newsletter, Tips
Insider threats are employees who leak or damage their own company’s data. Look for these seven indicators when preventing insider threats.
Read MoreNine DevSecOps secret scanning tools to keep the bad guys at bay
By Clement Lee, Security Architect, APAC, Check Point Software Technologies | Apr 26, 2022 | Newsletter, Tips
With the secrets of over 2m corporations already leaked, it is time to mandate action to plug the preventable gaps
Read MoreTips: Operational Technology Attack Predictions
How to predict OT attacks to secure your industrial environment
Read MoreMoving SIEM to the cloud – more than just cost savings
By Neil Campbell, Vice President, APJ, Securonix | Apr 25, 2022 | Newsletter, Opinions, Tips
Key considerations for mitigating SIEM costs with the right architecture and deployment models.
Read MoreFour key cyber strategies to isolate supply chain cyber risks
By Marco Sin, Head of Advisory, Hong Kong, Ensign Infosecurity | Apr 21, 2022 | Most Read1, Newsletter, Tips
The era of “mind your own corporate cybersecurity” is gone. Time to mind mutual cybersecurity risks or risk business collapse!
Read More
Gamification listing
PARTICIPATE NOW |
|
sponsors-RCA

Whitepapers
Whitepaper: IT and OT Infrastructure Cybersecurity Threats
Industrial cybersecurity threats that can bring down critical infrastructuresDownload WhitepaperSecurity Challenges of Work-From-Anywhere
Work-from-anywhere enterprise security challenges and solutionsDownload WhitepaperStruggling to Securely Keep Up with Digital Acceleration
Digital acceleration is posing security challenges and solutions for enterprisesDownload Whitepaper2021 Human Factor Report
How ransomware, email threats, and other threat actors evolved and the latest techniques used in …Download Whitepaper
Case Studies
Retail wealth management firm taps API technology for secure personalized outreach
A wealthtech firm managed to handle the deluge of panic enquiries at the beginning of …Read moreStock exchange reaches for the Cloud to meet compliance, agility targets
Improving data management automation, data-driven services and regulatory compliance levels sets the pace for India’s …Read moreTransport industry a major cyber target: Indonesia acts to ramp up defenses
The country’s largest taxi operator turns to AI-driven cybersecurity upgrades to protect its critical national …Read morePhilippines payment platform hardens cloud application security infrastructure
This includes rooting out vulnerabilities in container images and serverless functions, cloud misconfigurations, and hidden …Read more