Hacking the Singapore government: Q&A with a ...
By CybersecAsia editors | Nov 11, 2019 | Features, White, Black & Grey Hat Hackers | 0
Can ethical hacking improve your security posture?
By Myles Hosford, Head of Security Architecture, ASEAN, Amazon Web Services | Feb 5, 2020 | Opinions, White, Black & Grey Hat Hackers
Understand what makes hackers tick – then you can decide on the best approach. Cybersecurity professionals see some threat actors or...
Read MoreHacking the Singapore government: Q&A with a top hacker
By CybersecAsia editors | Nov 11, 2019 | Features, White, Black & Grey Hat Hackers
Last week, HackerOne announced the results of the second bug bounty challenge with the Ministry of Defence, Singapore (MINDEF). The three-week...
Read MoreSingapore’s Ministry of Defence bolstered security with bug bounty challenge
By CybersecAsia editors | Oct 1, 2019 | News, White, Black & Grey Hat Hackers
HackerOne invites 400 trusted hackers to look for security weaknesses in MINDEF to enhance cybersecurity. HackerOne recently announced that...
Read MoreApple’s $1M bug bounty an arms race for zero-days
By Taylor Armerding, Software Security Expert, Synopsys Integrity Group | Sep 19, 2019 | Opinions, Software Development Lifecycle Security, White, Black & Grey Hat Hackers
Apple have expanded its bug bounty program to all researchers to US$1 million top prize to turn black hats white. Apple is taking bug bounties to a...
Read MoreNational University of Singapore empowers student ethical hackers to bolster cybersecurity
By CybersecAsia editors | Sep 7, 2019 | Cybersecurity Training & Certification, News, White, Black & Grey Hat Hackers
Students benefit from HackerOne’s training and expertise earning bounties while securing the university against security vulnerabilities. HackerOne...
Read MoreEthical hacking competition for cybersecurity talent development
By CybersecAsia editors | Sep 5, 2019 | Cybersecurity Training & Certification, News, White, Black & Grey Hat Hackers
Trend Micro’s global ‘capture the flag’ provided real-world ethical hacking experience in the most critical areas for stopping...
Read More
Voters-draw
Thales Gamification
Gamification listing
PARTICIPATE NOW |
|
Vote Now -Placment
BB HTC
Top-Sidebar-banner
Whitepapers
Post-Pandemic APAC Digital Transformation and OT Cyber Security
All you need to know about digital transformation and OT cybersecurity in Asia in the …Download WhitepaperFour Things to Consider to Successfully and Securely Run Critical Applications in the Cloud
Use this checklist to securely and successfully run critical applications in the cloud and maximize …Download WhitepaperCriteria Guide When Choosing An Endpoint Detection and Response (EDR) Solution
Use this checklist to make a more informed decision when choosing an endpoint detection and …Download WhitepaperCyber Threat Predictions for 2023 by FortiGuard Labs
Learn the cyber threat predictions in 2023 in this annual perspective by FortiGuard Labs.Download Whitepaper
Middle-sidebar-banner
Case Studies
Maxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead moreFortinet Security Fabric Protects Yedpay’s New Cloud Environment
Yedpay Power Its Business Growth with Fortinet Security FabricRead moreCase Studies: 1.5 million lessons from the SingHealth hack
Learn the lessons from this post-mortem of a healthcare information hackRead more