Gift card scams dissected
By CybersecAsia editors | Dec 29, 2020 | Newsletter, Tips | 0
Averting the solar flare fallout from the Sunburst...
By CybersecAsia editors | Dec 23, 2020 | Newsletter, Tips | 0
Coming up in 2021: stalkerware, Excel 4 macros and whole shebang
By CybersecAsia editors | Jan 7, 2021 | Newsletter, Tips
Here are some tips for evading or mitigating these threats in the year ahead …
Read MoreThese five cybersecurity trends will have CISOs scrambling this year
DX laggards are paying a heavy price; yet the now-mandatory DX can also exert a heavy penalty if not secured thoroughly.
Read MoreGift card scams dissected
By CybersecAsia editors | Dec 29, 2020 | Newsletter, Tips
Understanding how business email compromises work to push fraudulent gift cards can vaccinate us from increasingly-sophisticated variants that will inevitably surface.
Read MoreAverting the solar flare fallout from the Sunburst attack
By CybersecAsia editors | Dec 23, 2020 | Newsletter, Tips
By now, affected organizations would have already mitigated the effects, but here are more tips for avoiding similar future scenarios.
Read MoreLooking backward to look ahead: A year of bumper cybercrime is in store!
By CybersecAsia editors | Dec 18, 2020 | Newsletter, Tips
By examining 2020 attack trends, we can glean five ominous threats in the year ahead and guide your 2021 cybersecurity posture.
Read More7 ways to stay safe when gaming online
By CybersecAsia editors | Dec 17, 2020 | Newsletter, Tips
With one-third of gamers surveyed reporting unpleasant experiences such as scams, bullying and cheats, you need these gentle reminders …
Read MoreAre your children’s schools part of the 50% that are vulnerable to hackers?
By CybersecAsia editors | Dec 14, 2020 | Newsletter, Tips
Here is a checklist to show their IT teams just to make sure school is not unduly disrupted next year.
Read MoreHackers now reviving Vishing to supplement Phishing
By CybersecAsia editors | Nov 25, 2020 | Newsletter, Tips
Here are five tips to educate everyone—especially remote workers—about phone calls aimed at phishing for contact information.
Read MoreThe CISO checklist for subscribing to threat intelligence support
By CybersecAsia editors | Nov 5, 2020 | Newsletter, Tips
Why pay for premium threat intelligence, and how to choose a suitable service? Here are the objective arguments and tips …
Read MoreEstablishing the four key pillars to support tight endpoint security
By CybersecAsia editors | Oct 29, 2020 | Newsletter, Tips
Nowadays, enforcing cybersecurity is more about the unknown threats than the known. Here are the key bastions of battling the unknown.
Read MoreBlocking web services to protect employees: how to strike a balance
By CybersecAsia editors | Oct 28, 2020 | Newsletter, Tips
Here are some tips and statistics to help employers protect their staff from phishing attacks while maintaining productivity and socialization...
Read More5G: Always-on connectivity demands always-on security
By CybersecAsia editors | Oct 27, 2020 | Cyberthreat Landscape, Newsletter, Tips
With billions of smart 5G/IoT devices coming online 24/7 via distributed 5G networks soon, hackers are getting ready for massive windfalls. With the...
Read MoreStaying safe at the year-end massive e-sales, starting with Prime Day
By CybersecAsia editors | Oct 13, 2020 | Newsletter, Tips
Cos we are nearing that time of the year when global sales events and massive discounts will attract hordes of hackers!
Read MoreCan you tell cybersecurity fact from fiction? Take this challenge!
By CybersecAsia editors | Oct 12, 2020 | Newsletter, Tips
Here are 12 easy questions to help you gauge your understanding of cloud cybersecurity folklore, wishful thinking and delusions.
Read MoreIf it connects to a network, it has to be configured properly
By CybersecAsia editors | Oct 12, 2020 | Newsletter, Tips
During Cybersecurity Awareness Month (Oct 2020), follow this and six other basic but crucial tips to spring-clean WFH security.
Read More3 tips for choosing a next-generation firewall for small businesses
By Cisco | Oct 6, 2020 | Sponsored, Tips, Whitepapers
Threats have evolved. Businesses of every size are at risk. Has your security posture evolved to meet the challenges?
Read More5 tips for choosing a next-generation firewall
By Cisco | Oct 6, 2020 | Sponsored, Tips, Whitepapers
Ready to invest in a next-generation firewall (NGFW)? Here’s a checklist of 5 things it should deliver…
Read MoreTop 10 considerations when choosing a modern single sign-on solution
By CyberArk | Oct 2, 2020 | Sponsored, Tips, Whitepapers
Not all single sign-on (SSO) solutions are created equal, and choosing the right one can be a challenging process. Over-reliance on passwords negatively impacts end-user productivity.
Read MoreIDaaS buyers’ guide
By CyberArk | Oct 2, 2020 | Sponsored, Tips, Whitepapers
The right Identity-as-a-Service (IDaaS) solution can reap enormous benefits, such as risk reduction, cost savings and productivity gains.
Read MoreFour simple steps to protect your website
By CybersecAsia editors | Sep 30, 2020 | Newsletter, Tips
The following tips may be the barest basics, but given APAC’s rising incidence of web attacks, these tips bear reiteration …
Read More

Whitepapers
Webinar: Best practices for teleworkers at scale
Learn how your organization could more effectively provision network bandwidth, support and security for your …Download WhitepaperMaximize the ROI of detection and response
Cut costs by 44% by consolidating tools and streamlining operations for cyber-threat detection and response.Download WhitepaperHealthcare organization addresses cloud access management challenges
Healthcare and recruitment data are some of the most sensitive information, and need special protection …Download WhitepaperModern application development security
Highlights of ESG’s latest study on AppDev security trends.Download Whitepaper
More News
Case Studies
Are we ready for the next big breach?
How organizations across various industries prevent breaches, get deep visibility to detect and stop threats …Read moreIdaptive reduces complexity, increases security for NZ agricultural organization
Challenge: find a single sign-on solution to reduce complexity, minimize calls for password assistance, increase …Read moreEmail Security Threat Report 2020
Email and collaboration platforms are the connective tissue of most businesses and organizations, where information …Read moreLeading Malaysian developer zeroes in on threats with LogRhythm
Full visibility and intelligent detection eliminate cybersecurity blind spots and reduce response time for UDA. …Read more