Cybersecurity: looking back 2021, looking ahead 20...
By CybersecAsia editors | Jan 20, 2022 | Video, Virtual Event | 0
Ransomware attacks & enterprise response in A...
By CybersecAsia editors | Jul 29, 2021 | Video, Virtual Event | 0
Top 2022 cyberthreats & 2023 cybersecurity predictions for Asia Pacific
By CybersecAsia editors | Dec 1, 2022 | Most Read1, Video, Virtual Event
Listen in to this recording of this online session to discover the top 2022 cyberthreats and 2023 cybersecurity predictions for Asia Pacific
Read MoreCybersecurity: looking back 2021, looking ahead 2022
By CybersecAsia editors | Jan 20, 2022 | Video, Virtual Event
Listen in as we discuss the cybersecurity trends and developments in 2021, and look ahead at the cyber-threat landscape in 2022:
Read MoreRansomware attacks & enterprise response in APAC
By CybersecAsia editors | Jul 29, 2021 | Video, Virtual Event
It doesn’t pay to pay ransomware. But how should you protect your business and bottom-line from the damages of cyber-attacks?
Read MoreTrack an Attack on Critical Infrastructure
Operational technology (OT) SOC teams face tremendous pressure when dealing with the complex scale of critical infrastructure cyberattacks. But there is a solution that helps analysts better correlate data and...
Read MoreNTT protects customers and employees with Cisco Umbrella
Highlights of NTT’s 8th annual threat report specially for busy executives in the Asia Pacific region.
Read More4 key application experience monitoring technologies you cannot ignore
Some real-world cases that use 4 key technologies to meet the challenges of application experience management.
Read MoreHow organizations protect against ransomware
By CrowdStrike | Jun 9, 2021 | Sponsored, Video
This annual report offers important lessons and recommendations for security teams operating in today’s environment, where visibility and speed are more critical than ever.
Read MoreBMW Motorsport: importance of data
Learn more about the Fortinet and BMW Motorsport Partnership and the importance of data on the racetrack.
Read MoreThe rise of virtual CISO
By CybersecAsia editors | May 11, 2021 | Newsletter, Video
Video interview featuring Jaydeep Ruparelia, CEO, Infopercept Consulting, on the role and popularity of virtual CISOs in Asia.
Read MoreHow to keep our children safe from online predators
By CybersecAsia editors | May 4, 2021 | Newsletter, Video
Video interview featuring Mohamed Mustafa Saidalavi from India's DISC Foundation and the UAE's SAFE Society.
Read MoreOvercoming cybersecurity challenges in the digital transformation journey
By CybersecAsia editors | Apr 19, 2021 | Video, Virtual Event
Challenges, opportunities and strategies in managing and securing user identity and access, for effective transformation in the cloud-based digital economy.
Read MoreCyberchat between Proficio and Splunk
By Proficio | Mar 4, 2021 | Sponsored, Video, Whitepapers
Listen in as two experts discuss how CISOs and cybersecurity teams can better articulate the needs and challenges of modernizing SOCs today.
Read MoreWebinar: The 2021 threat forecast
By BlackBerry | Mar 1, 2021 | BlackBerry, BlackBerry Webinars, Sponsored, Video, Whitepapers
Join this on-demand session for a peek into the threat landscape in 2021…
Read MoreCybersecurity: Looking at 2021 with BlackBerry
By BlackBerry | Feb 9, 2021 | Sponsored, Video
Listen in as cybersecurity experts from BlackBerry discuss the cyber-threat landscape in 2021.
Read MoreWebinar: Choosing the right secure messaging solution for your business
By BlackBerry | Jan 28, 2021 | BlackBerry, BlackBerry Webinars, Sponsored, Video, Whitepapers
Join this on-demand panel discussion on choosing the right messaging and collaboration solution for your organization.
Read MoreWebinar: Best practices for teleworkers at scale
By Fortinet | Jan 14, 2021 | Sponsored, Video, Whitepapers
Learn how your organization could more effectively provision network bandwidth, support and security for your growing remote workforce.
Read MorePanel discussion: transforming your WAN and security for successful digitalization
By CybersecAsia editors | Oct 23, 2020 | Video, Virtual Event
To survive – and thrive – in the ‘new normal’, successful digital enterprises require both WAN and security transformation.
Read MoreBeyond the curve: the reintroduction of the workforce
By RSA Conference | Sep 23, 2020 | Newsletter, Video
Evolution of security in the ‘new normal’ workplace. While most of the focus recently has been on enabling remote workers, many security leaders are thinking about how to reintroduce people...
Read MoreThe human elements in cyber security
By RSA Conference | Aug 25, 2020 | Newsletter, Video
A montage video featuring respected cybersecurity experts and leaders on the human elements in cyber security. Designing secure technology and...
Read MoreFixing the Zoom ‘Vanity Clause’
By Check Point Software Technologies | Jul 17, 2020 | Newsletter, Video
Check Point and Zoom have collaborated to fix the Vanity URL issue. Check Point and Zoom have recently liaised to resolve a security issue recently...
Read More
Voters-draw
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
BB HTC
Middle-sidebar-banner
Whitepapers
A SANS Survey: Rethinking the Sec in DevSecOps: Security as Code
List of the top AppSec trends and interesting new innovations in 2022.Download WhitepaperDevelopers Guide: Top 10 OWASP API Security Issues
A developer’s technical guide to the top 10 Open Web Application Security Project (OWASP) API …Download WhitepaperConversational Microsoft 365 Data Backup
All you need to know about conversation Microsoft 365 data backup and recoveryDownload WhitepaperThe Global Enterprise Authentication Practices
Learn the global enterprise authentication practices in this Yubico survey research in partnership with Censuswide.Download Whitepaper
Case Studies
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & Access Management
CyberArk is the Only Leader in Both 2022 Gartner® Magic Quadrant™ Reports for PAM & …Read moreGrace implements Check Point solutions for comprehensive protection
A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read moreMaxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead more