More staff returning to office? Time to retake los...
By CybersecAsia editors | Apr 13, 2021 | Newsletter, Tips | 0
The hackers’ mission: You scrape my back, I scrape...
By L L Seow | Apr 12, 2021 | Newsletter, Tips | 0
Oops, your “old” personal data has been leaked. No...
By L L Seow | Apr 12, 2021 | Newsletter, Tips | 0
How to defend against covert code trying to run in memory
Dynamic Shellcode Protection is designed to expose and block fileless malware, ransomware and remote access agents.
Read MoreMore staff returning to office? Time to retake lost cybersecurity opportunities
By CybersecAsia editors | Apr 13, 2021 | Newsletter, Tips
After a year of home usage, office laptops need to be quarantined and sanitized, according to a cybersecurity scientist.
Read MoreThe hackers’ mission: You scrape my back, I scrape your data
By L L Seow | Apr 12, 2021 | Newsletter, Tips
When hackers feel heckled by cyber defenders, they scrape even ‘old’ data to wreak revenge. Protect yourself with these safety tips …
Read MoreOops, your “old” personal data has been leaked. Now what?
By L L Seow | Apr 12, 2021 | Newsletter, Tips
What can YOU do to minimize further damage when hackers use that “old” data to hurt you and your contacts?
Read MoreWhat a difference a year made to financial malware tactics
By CybersecAsia editors | Apr 6, 2021 | Newsletter, Tips
Last year’s financial cyberthreats were wider in global reach and more focused on mobile users. However, mobile-security best practices remain perennial.
Read MoreCorporate doxxing: The personal details you reveal could be doxxed against your organization
By CybersecAsia editors | Mar 31, 2021 | Newsletter, Tips
Moral of the story: watch what you disclose on the Internet before your organization gets hit by doxxers reading your escapades
Read MoreHow secure is your cloud infrastructure without a CASB?
By Jonathan Tan, Managing Director, Asia, McAfee | Mar 25, 2021 | Newsletter, Tips
With WFH and remote-working pandemonium still festering, find out four ways that a cloud access security broker can stop unsanctioned behavior.
Read MoreSix principles to keep safe on TikTok and social media sharing platforms
By CybersecAsia editors | Mar 24, 2021 | Newsletter, Tips
With all the mishaps on social media and sharing platforms coming to light, we need to tighten our sharing instincts …
Read MoreUsing RDP to drive remote-working: does the R stand for remote or risky?
By CybersecAsia editors | Mar 18, 2021 | Newsletter, Tips
Actually, it is all up to cyber defenders. Here is one AI-based cyber strategy that turns risk into responsiveness.
Read MoreKnow the anatomy of the SolarWinds attack chain
By Lavi Lazarovitz, Head, Security Research, CyberArk | Mar 12, 2021 | Newsletter, Tips
Knowing thy enemy and his tactics, techniques and procedures can save thy data …
Read MoreThe Philippines money-lending platform breach: did you get the message?
By Carlo Cordova | Mar 5, 2021 | Features, Tips
In their heinous acts, cybercriminals take no prisoners—not even penniless people. The same goes for struggling organizations that downplay cybersecurity.
Read MoreMDR checklist for your Splunk environment
By Proficio | Mar 4, 2021 | Sponsored, Tips, Whitepapers
Is your managed detection and response (MDR) service provider giving you the best security services possible?
Read MoreAs workers move offsite, cybercrooks focus on workers’ mobility tools
By CybersecAsia editors | Mar 1, 2021 | Newsletter, Tips
You guessed it: smartphones are the new target! Here are the tipoffs to help organizations recognize and plug up attack surfaces.
Read MoreEight key application security testing features to look out for
By CybersecAsia editors | Feb 26, 2021 | Newsletter, Tips
DAST, SAST, SCAT… how should CISOs shortlist suitable AST solutions for their organizations’ consideration? Read on to find out…
Read MoreWhy should 5G implementation not be rushed? Here are three macro-level insights
By L L Seow | Feb 24, 2021 | Newsletter, Tips
The security risks of rushed 5G implementation can potentially overshadow the technology’s promises: we all need a 5G sanity check.
Read MoreKnow the 4 tenets of productive WFH security
By Anurag Kahol, CTO at Bitglass | Feb 23, 2021 | Newsletter, Tips
In the rush to implement work-from-home processes, organizations may have missed out some important principles that can facilitate productivity.
Read MoreFour cybersecurity trends that enterprises must watch in the Lunar Ox Year
By CybersecAsia editors | Feb 23, 2021 | Newsletter, Tips
An Ox is a castrated adult male bull: so APAC enterprises should strive to have bullish cybersecurity in the months ahead!
Read MoreDon’t let security nightmares dampen your 5G dreams
By CybersecAsia editors | Feb 18, 2021 | Newsletter, Tips
Here are six considerations for NOT rushing to push out or adopt 5G before ensuring native security is in place…
Read MoreThree emerging threat vectors to watch out for
By CybersecAsia editors | Feb 17, 2021 | Newsletter, Tips
QR code fraud, vaccine-theme phishing and loyalty-points takeovers are ready for harvest, so get your guards up now!
Read MoreHave a domain name? Beg bounty hunters may come after your firm
By CybersecAsia editors | Feb 16, 2021 | Newsletter, Tips
What you should do when unsolicited bug bounty hunters demand payment for identifying your system vulnerabilities…
Read More
Whitepapers
Preventing ransomware attacks from disrupting your business
Ransomware has been on the rise and growing more sophisticated. Old protection methods can’t deal …Download WhitepaperBuilding the foundation for digital trust
Securing the next generation of digital transformation with HSMs.Download WhitepaperThe 5 essential capabilities of an analytics-driven SOC
Security operations centers (SOCs) have evolved to address the volume and sophistication of cyber-attacks. Does …Download Whitepaper2020 Remote work-from-home cybersecurity report
How secure access solutions kept businesses running – and people and devices connected to the …Download Whitepaper
More News
Case Studies
The ‘Goldilocks’ security operations architecture
Finding the right balance between managed services and internal resources for cybersecurity and control.Read moreIdaptive reduces complexity, increases security for NZ agricultural organization
Challenge: find a single sign-on solution to reduce complexity, minimize calls for password assistance, increase …Read moreAre we ready for the next big breach?
How organizations across various industries prevent breaches, get deep visibility to detect and stop threats …Read moreEmail Security Threat Report 2020
Email and collaboration platforms are the connective tissue of most businesses and organizations, where information …Read more