Using AI to detect phishing: how does it work?
By Zac Amos | Mar 21, 2023 | Newsletter, Tips | 0
ChatGPT-3, what have you done for defenders lately...
By L L Seow | Mar 20, 2023 | Newsletter, Tips | 0
Improve application security in cloud native environments with these six measures
By Simon Pearce, CTO Advisor (APJC) Cisco AppDynamics | Mar 23, 2023 | Newsletter, Tips
A holistic, integrated strategy for application security is now essential for cloud-native businesses operating in an increasingly complex risk landscape
Read MoreUsing AI to detect phishing: how does it work?
By Zac Amos | Mar 21, 2023 | Newsletter, Tips
Here is a primer on how AI/ML algorithms can be used to monitor corporate correspondence for increasingly sophisticated (spear)phishing scams
Read MoreChatGPT-3, what have you done for defenders lately?
By L L Seow | Mar 20, 2023 | Newsletter, Tips
The world now knows how cybercriminals love the chatbot’s power to create chaos; but it is actually a double-edge sword …
Read MoreKnow the four thrusts of corporate cyber resilience and vigilance
By Dennis Chung, Chief Security Officer, Microsoft Singapore | Mar 17, 2023 | Newsletter, Tips
Amid a global landscape of political and economic turbulence, talent shortages and escalating cyberattack/espionage sophistication, four axioms of cybersecurity remain perennial
Read More5 steps for boosting your organization’s ransomware resilience
By CR Srinivasan, Executive VP (Cloud and Cybersecurity ) and Chief Digital Officer, Tata Communications | Mar 16, 2023 | Newsletter, Tips
They may sound basic to IT defenders, but these five steps bear reiteration here in case complacency or misconceptions take root
Read MoreTackling the cyber threats from unmanaged and BYOD smart devices
By CybersecAsia editors | Mar 15, 2023 | Newsletter, Tips
With cloud applications causing heavy usage of web browsers, more remote workers and staff on BYOD schemes are becoming cyber targets
Read MoreMainstreaming of cloud computing and flexi-work arrangements = expanded attack surfaces
By Michael Adams, Chief Information Security Officer, Zoom | Mar 6, 2023 | Newsletter, Tips
Here are four compelling technology and social trends that signal the need for not just cybersecurity but cyber resilience
Read MoreTake note: fraudsters are digitalizing faster than the FI industry!
By Dev Dhiman, Managing Director, APAC, GBG | Feb 15, 2023 | Newsletter, Tips
What can the financial services firms expect in light of this threat? Here are five scenarios.
Read MoreFake dating apps and love scams: sniff them out before you get devastated
By CybersecAsia editors | Feb 14, 2023 | Newsletter, Tips
Love is blind, but finding online romance is like running blindfolded in a minefield these days. Keep safe with these tips…
Read MoreOne day to V-Day: did you fall for any of these scams yet?
By L L Seow | Feb 13, 2023 | Newsletter, Tips
Every year, fraudsters and scammers love Valentine’s Day more than normal people. Why? Because celebrators can be so predictable and vulnerable!
Read MoreTowards a passwordless Internet for safer online experiences — even for seniors
By Andrew Shikiar, Executive Director, FIDO Alliance | Feb 7, 2023 | Tips
The silver generation is key target of scammers, so biometrics and other passwordless identity authentication features can really help here…
Read MoreWeed out hard-coded secrets before hackers violate your data!
By Ksenia Peguero, Senior Research Manager, Synopsys Software Integrity Group | Feb 6, 2023 | Newsletter, Tips
Inadvertently or otherwise, developers using hardcoded passwords or SSH keys for testing purposes could forget to remove them: invitation for trouble…
Read MoreEmerging technology innovations and trends in cybersecurity
By Narinder Kapoor, SVP and Managing Director, HPE Asia Pacific | Feb 6, 2023 | Most Read1, Newsletter, Tips
What Asia Pacific organizations should look out for in 2023 to stay ahead and secure in their digital transformation journeys
Read MoreSeven ways CEOs can mitigate a cyber crisis successfully
By Guy Segal, Vice President, Cyber Security Service (APAC), Sygnia | Jan 31, 2023 | Newsletter, Tips
How a CEO handles a cyber incident can result in an ordinary outcome, or one that repairs and rebuilds trust extraordinarily
Read More10 ways to safeguard organizational data in 2023
By Check Point Software Technologies | Jan 30, 2023 | Newsletter, Tips
Times have changed, but these 10 perennial data protection tips are a good reminder to IT teams on bolster data safeguards
Read MoreWith the Dark Web being so lucrative, cyber threats can only escalate
By Scott Jarkoff, Director, Strategic Threat Advisory Group (APJ & EMEA), CrowdStrike | Jan 19, 2023 | Newsletter, Tips
Take a closer look at what drives such shady online ecosystems, and how cybercrime is being digitalized to democratize
Read MoreTips for tightening corporate social media security in 2023
By Anna Larkina, Web content analysis expert; Roman Dedenok, Spam Analysis Expert, Kaspersky | Jan 18, 2023 | Newsletter, Tips
Here are seven ways for defenders to raise social engineering awareness and cyber risks this year
Read MoreUsher in the Year of the Rabbit, not the Phish!
By Proofpoint | Jan 17, 2023 | Infographic, Tips
Fish may be a symbol of prosperity, but phishing isn't...
Read MoreKnow the five Rs of 2023 cyber risks that impact CISOs
By Jeremy Pizzala, Cybersecurity Consulting Leader (Asia Pacific), EY | Jan 16, 2023 | Newsletter, Tips
Ransomware, regulatory pressure, and three other Rs will be worrying CISOs this year, and here is how they can cope …
Read MoreMore cyber predictions for 2023
By CybersecAsia editors | Jan 12, 2023 | Newsletter, Tips
Cybersecurity analysts/strategists usually have a good yearly overview of cyber trends. Here are eight to ponder over
Read More
Voters-draw
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
BB HTC
News
Middle-sidebar-banner
Whitepapers
Conversational Microsoft 365 Data Backup
All you need to know about conversation Microsoft 365 data backup and recoveryDownload WhitepaperThe Global Enterprise Authentication Practices
Learn the global enterprise authentication practices in this Yubico survey research in partnership with Censuswide.Download WhitepaperModern Identity Security For Stronger Defense
All you need to know about the requirements, features, and benefits of achieving Modern Identity …Download WhitepaperSecure the Application Journey Towards Digital Acceleration
Learn how to apply consistent security policies and controls to secure digital transformation across clouds …Download Whitepaper
More News
Case Studies
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & Access Management
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & …Read moreGrace implements Check Point solutions for comprehensive protection
A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read moreMaxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead more