Can software developers trust automated code gener...
By CybersecAsia editors | Mar 13, 2024
All the cyber world is a stage…
By Daniel Hand, Field CTO (APJ), Cloudera | Mar 5, 2024
Get cybersecurity advice straight from the GenAI c...
By L L Seow | Feb 26, 2024
Sprucing up cyber resilience in the financial services industry: four focal points
By Jason Harrell, Managing Director and Head of External Engagement, DTCC | Mar 19, 2024
How can the highly-targeted financial services industry remain operational and resilience in a year of escalating state-sponsored threats and cyberattacks?
Read MoreCan software developers trust automated code generation?
By CybersecAsia editors | Mar 13, 2024
As generative AI liberates more senior software developers from routing coding tasks, many other elements of this automation need consideration
Read MoreAll the cyber world is a stage…
By Daniel Hand, Field CTO (APJ), Cloudera | Mar 5, 2024
And all the cybercriminals, state-sponsored actors and white hat hackers are merely players. Here is a refresher on cybercrime tactics…
Read MoreStaying protected against new forms of QR code scams
By Josh Cigna, Solutions Architect, Yubico | Mar 4, 2024
Leveraging the convenience and commonality of QR codes at point-of-sale counters, cybercriminals are now extending their scams to brand impersonation tactics.
Read MoreGet cybersecurity advice straight from the GenAI chatbots!
By L L Seow | Feb 26, 2024
Who better to ask for the best strategies to defend against GenAI-enhanced cyber threats than the chatbots themselves?
Read MoreHow phishing-resistant are free or low-cost multifactor authentication methods?
By Geoff Schomburgk, Asia Pacific Vice President at Yubico | Feb 16, 2024
The answer may surprise you, but not cybercriminals.
Read MoreSeven technology trends that cyber talent should know about
By CybersecAsia editors | Feb 16, 2024
What can readers expect this year in the areas of networking, edge computing, private 5G, data centers and security?
Read MoreTowards holistic cybersecurity: the platform-based approach
By Sapna Sumbly, Director, BFSI Business (SEA), Trend Micro | Feb 15, 2024
As attack surfaces continue to expand amid raging geopolitical, economic and technocratic agendas, cybersecurity will need to be holistic in scope.
Read MoreTime to add Identity Threat Detection and Response to your cyber arsenal
By Jennifer Cheng, Director of Cybersecurity Strategy (Asia Pacific and Japan), Proofpoint | Feb 14, 2024
Even organizations with EDR/XDR protection may be vulnerable to identity-based threats. Implementing ITDR could bridge the missing link…
Read MoreResponsible AI development: It takes a village
By Foo Siang-Tse, Senior Partner (Cyber), NCS | Feb 13, 2024
With generative AI being abused internationally by cybercriminals, the ‘village’ needed to tape AI’s positive potential has to be global.
Read MoreVoters-draw/RCA-Sponsors
CybersecAsia Voting Placement
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
Whitepapers
Secure Access Service Edge (SASE) Solutions for Today’s Work-From-Anywhere (WFA) Environment
Organizations are turning to Secure Access Service Edge (SASE) solutions for securing remote work environments, …Download WhitepaperIdentity Has Breached the Ecosystem
This whitepaper explores the dual nature of identity in cybersecurity, emphasizing its role in both …Download WhitepaperFortanix Buyers Guide for Modern Key Management and Data Security
This document underscores the pressing challenges in key management and data securityDownload WhitepaperFortanix Data Risk Management – Using Tokenization to Secure Your Data
In today's digital world, organizations prioritize data security. To protect sensitive information, they use tokenization, …Download Whitepaper
Middle-sidebar-banner
Case Studies
Identity security woes now a thing of the past for Heng Leong Hang
The retail chain was grappling with numerous cyber risks in its IT infrastructure until it …Read moreIndonesia’s cyber defense agency tackles Defender’s Dilemma with new initiatives
The country’s public sector will benefit from three pillars of training, intelligence and capacity-building schemes …Read moreSingAREN showcases what a national research community needs for cyber protection
With threat actors thirsting to steal international research data, what kind of cybersecurity platform can satisfy …Read moreIndian pharmaceutical firm futureproofs security with Check Point
Safeguarding research data and intellectual property requires a futureproofed security infrastructure.Read more