www.cybersecasia.net
Open in
urlscan Pro
18.140.38.73
Public Scan
Submitted URL: http://www.cybersecasia.net/
Effective URL: https://www.cybersecasia.net/
Submission: On February 07 via api from SG — Scanned from DE
Effective URL: https://www.cybersecasia.net/
Submission: On February 07 via api from SG — Scanned from DE
Form analysis
3 forms found in the DOMGET https://www.cybersecasia.net/
<form data-min-no-for-search="1" data-result-box-max-height="400" data-form-id="9137" class="is-search-form is-form-style-default is-form-id-9137 is-ajax-search" action="https://www.cybersecasia.net/" method="get" role="search"><label
for="is-search-input-9137"><span class="is-screen-reader-text">Search for:</span><input type="search" id="is-search-input-9137" name="s" value="" class="is-search-input" placeholder="Search here..." autocomplete="off"><span
class="is-loader-image" style="display: none;background-image:url(https://www.cybersecasia.net/wp-content/plugins/add-search-to-menu/public/images/spinner.gif);"></span></label><input type="submit" value="Search" class="is-search-submit"><input
type="hidden" name="post_type" value="post"></form>
GET https://www.cybersecasia.net/
<form data-min-no-for-search="1" data-result-box-max-height="400" data-form-id="9137" class="is-search-form is-form-style-default is-form-id-9137 is-ajax-search" action="https://www.cybersecasia.net/" method="get" role="search"><label
for="is-search-input-9137"><span class="is-screen-reader-text">Search for:</span><input type="search" id="is-search-input-9137" name="s" value="" class="is-search-input" placeholder="Search here..." autocomplete="off"><span
class="is-loader-image" style="display: none;background-image:url(https://www.cybersecasia.net/wp-content/plugins/add-search-to-menu/public/images/spinner.gif);"></span></label><input type="submit" value="Search" class="is-search-submit"><input
type="hidden" name="post_type" value="post"></form>
POST https://ma.zoho.com/weboptin.zc
<form class="zh_formcont" method="POST" id="zcampaignOptinForm" target="_zcSignup" action="https://ma.zoho.com/weboptin.zc">
<div style="padding-right: 50px; box-sizing: border-box">
<div style="background-color: rgb(255, 235, 232); padding: 10px; color: rgb(210, 0, 0); font-size: 11px; margin: 0px 15px 0px; border: 1px solid rgb(255, 217, 211); display: none; width: 100%" id="errorMsgDiv"> Please correct the
marked field(s) below. </div>
</div>
<div class="zh_frominpcont" style="width: 313px; height: 43px"> <input type="text" class="zh_forminput csrdrag" name="LASTNAME" changetype="LASTNAME" changeitem="SIGNUP_FORM_FIELD" id="LASTNAME" placeholder="FULL NAME" autocomplete="off"
style="left: -14px; top: 105px; color: rgb(146, 146, 144); font-family: Arial; font-size: 15px; border-width: 2px; border-color: rgb(255, 255, 255)"> </div>
<div class="zh_frominpcont" style="width: 313px; height: 43px"> <input type="text" class="zh_forminput csrdrag" name="CONTACT_EMAIL" changetype="CONTACT_EMAIL" changeitem="SIGNUP_FORM_FIELD" id="CONTACT_EMAIL" placeholder="WORK EMAIL"
autocomplete="off" style="left: -13px; top: 102px; font-size: 15px; border-color: rgb(255, 255, 255)"> </div>
<div class="zh_frombtncont" style="width: 298px; height: 50px"> <input class="zh_forminputbtn csrdrag" type="button" value="SUBSCRIBE" name="SIGNUP_SUBMIT_BUTTON" changetype="SIGNUP_SUBMIT_BUTTON" id="zcWebOptin"
style="position: relative; left: -12px; top: 100px; background-color: rgb(235, 31, 32); border-width: 1px; font-size: 18px; padding: 0px !important; border-color: rgb(235, 31, 32)"> </div>
<div>
<!-- Do not edit the below Zoho Campaigns hidden tags -->
<input type="hidden" id="fieldBorder" value="rgb(255, 255, 255)" onload=""><input type="hidden" name="zc_trackCode" id="zc_trackCode" value="ZCFORMVIEW"><input type="hidden" id="submitType" name="submitType" value="optinCustomView">
<input type="hidden" name="zx" id="cmpZuid" value="12986efb5">
<input type="hidden" name="zcvers" value="2.0"><input type="hidden" id="mode" name="mode" value="OptinCreateView"><input type="hidden" id="document_domain" value=""><input type="hidden" id="zc_Url" value="cped.maillist-manage.com">
<input type="hidden" id="new_optin_response_in" value="0">
<input type="hidden" id="duplicate_optin_response_in" value="0">
<input type="hidden" id="zcFormType" value="EGFORM">
<input type="hidden" id="zc_formIx" name="zc_formIx" value="3z4440bab079297021cda8e791b86bef8e0044f59b1cac535ee61b4d03a4c63e38">
<!-- End of the campaigns hidden tags -->
<input type="hidden" id="popupType" value="1">
<input type="hidden" id="ZCMP_close" value="1">
</div><input type="text" style="display:none !important;" name="qs" class="ih"><input type="text" style="display:none !important;" name="lf" class="ih" value="1644204050969"><input type="hidden" name="di" value="1144032199171412881644204050970">
</form>
Text Content
Our website uses cookies to provide you with personalized content and for site analysis. If you continue to use the site without choosing your preference, we'll assume that you're fine with cookies.+ CYBERSECURITY NEWS IN ASIA RECENT STORIES: SEGA moves faster with flow-based network monitoring Are organizations doing enough to secure remote-workers and corporate ... Financial sector was most targeted in Q3 2021: report Widespread impact of ransomware in Asia Pacific Hackers increasingly targeting zero-day vulnerabilities, supply chain ... Combatting financial fraud in four data-driven ways * * * * * LOGIN REGISTER * Features * FEATURED ARE ASIA’S REAL ESTATE INDUSTRIES FAIR GAME TO CYBERCRIMINALS AND APTS? Friday, January 28, 2022, 5:01 PM Asia/Singapore | Features, Newsletter * FEATURED FROM INDUSTRY 4.0 TO PHARMA 4.0: TOWARDS SAFER AND MORE SUSTAINABLE INDUSTRIAL PRODUCTION Monday, January 24, 2022, 8:43 AM Asia/Singapore | Features, Newsletter * FEATURED PLUGGING THE GAP BETWEEN WEB APPLICATION FIREWALLS AND PERIMETER CONTROLS: RASP Friday, January 21, 2022, 8:56 AM Asia/Singapore | Features, Newsletter * News * FEATURED ARE ORGANIZATIONS DOING ENOUGH TO SECURE REMOTE-WORKERS AND CORPORATE ASSETS? Friday, February 4, 2022, 5:11 PM Asia/Singapore | News, Newsletter * FEATURED FINANCIAL SECTOR WAS MOST TARGETED IN Q3 2021: REPORT Friday, February 4, 2022, 5:05 PM Asia/Singapore | News, Newsletter * FEATURED LOGISTICS GIANT WAS THE MOST IMPERSONATED BRAND USED IN Q4 2021 PHISHING CAMPAIGNS Friday, February 4, 2022, 2:59 PM Asia/Singapore | News, Newsletter * Opinions * Tips * Whitepapers * Awards * Directory * Select Page * * * * * LOGIN REGISTER * Features * FEATURED ARE ASIA’S REAL ESTATE INDUSTRIES FAIR GAME TO CYBERCRIMINALS AND APTS? Friday, January 28, 2022, 5:01 PM Asia/Singapore | Features, Newsletter * FEATURED FROM INDUSTRY 4.0 TO PHARMA 4.0: TOWARDS SAFER AND MORE SUSTAINABLE INDUSTRIAL PRODUCTION Monday, January 24, 2022, 8:43 AM Asia/Singapore | Features, Newsletter * FEATURED PLUGGING THE GAP BETWEEN WEB APPLICATION FIREWALLS AND PERIMETER CONTROLS: RASP Friday, January 21, 2022, 8:56 AM Asia/Singapore | Features, Newsletter * News * FEATURED ARE ORGANIZATIONS DOING ENOUGH TO SECURE REMOTE-WORKERS AND CORPORATE ASSETS? Friday, February 4, 2022, 5:11 PM Asia/Singapore | News, Newsletter * FEATURED FINANCIAL SECTOR WAS MOST TARGETED IN Q3 2021: REPORT Friday, February 4, 2022, 5:05 PM Asia/Singapore | News, Newsletter * FEATURED LOGISTICS GIANT WAS THE MOST IMPERSONATED BRAND USED IN Q4 2021 PHISHING CAMPAIGNS Friday, February 4, 2022, 2:59 PM Asia/Singapore | News, Newsletter * Opinions * Tips * Whitepapers * Awards * Directory * CYBERSECURITY NEWS IN ASIA ARE ASIA’S REAL ESTATE INDUSTRIES FAIR GAME TO CYBERCRIMINAL... By Balasubramanian Swaminathan, IMAWS | Jan 28, 2022 FROM INDUSTRY 4.0 TO PHARMA 4.0: TOWARDS SAFER AND MORE SUST... By Carlo Cordova | Jan 24, 2022 PLUGGING THE GAP BETWEEN WEB APPLICATION FIREWALLS AND PERIM... By Anamika Sahu | IMAWS | Jan 21, 2022 CAN TOO MUCH CYBER PRODUCT INFO WAYLAY FINANCIAL SECTOR CXOS... By Anamika Sahu | IMAWS | Jan 14, 2022 FROM REACTIVE RECOVERY TO PROACTIVE PROTECTION By Victor Ng | Dec 17, 2021 WHAT YOUR INDUSTRY DOESN’T KNOW CAN HURT YOU MOST By Victor Ng | Dec 16, 2021 PreviousNext 123456 SECURITY NEWS ARE ORGANIZATIONS DOING ENOUGH TO SECURE REMOTE-WORKERS AND CORPORATE ASSETS? Feb 4, 2022 Balancing worker productivity and corporate security in remote- and hybrid-working arrangements can be challenging. * FINANCIAL SECTOR WAS MOST TARGETED IN Q3 2021: REPORT Feb 4, 2022 * LOGISTICS GIANT WAS THE MOST IMPERSONATED BRAND USED IN Q4 2021 PHISHING CAMPAIGNS Feb 4, 2022 * BEWARE: DEFI AND CRYPTO SCAMMERS ARE OUT TO GET YOU Jan 28, 2022 EXPERT OPINIONS MICROSERVICES, SUPPLY CHAIN SECURITY WILL BE 2022 APAC PRIORITIES Dec 30, 2021 In addition, this expert foresees continued cyber exploitation of pandemic anxieties, as well as two other trends to watch for * ANOTHER YEAR LIKE 2021, BUT WORSE: DATA PROTECTION/MANAGEMENT TRENDS 2022 Dec 28, 2021 * WILL 2022 BE A YEAR OF HUMAN-FOCUSED CYBER AWARENESS? Dec 27, 2021 * BEYOND CYBER PROTECTION: CYBER RESILIENCE AS A CORNERSTONE OF ECONOMIC RECOVERY Dec 20, 2021 TIPS COMBATTING FINANCIAL FRAUD IN FOUR DATA-DRIVEN WAYS Feb 4, 2022 After two years of battering, the banking and financial services industry will use data to preempt and protect itself in APAC. * DIGITALIZATION HAS ESCALATE CONSUMER EXPECTATIONS OF DATA PRIVACY: DEAL WITH IT! Jan 31, 2022 * HOW TO GET EVERYONE IN THE ORGANIZATION TO BE A RISK MANAGEMENT STAKEHOLDER Jan 31, 2022 * SHOULD DATA PRIVACY BE COMMEMORATED AT ALL? Jan 27, 2022 CYBERSECURITY: LOOKING BACK 2021 | LOOKING AHEAD 2022 IDENTITY SECURITY IN THE HYBRID WORK & CLOUD ERA Ransomware Attack & Enterprise Response in APAC Panel discussion: transforming your WAN and security for successful transformation Overcoming cybersecurity challenges in the digital transformation journey Overcoming cybersecurity challenges in the digital transformation journey Overcoming cybersecurity challenges in the digital transformation journey CLOUD SECURITY DATABASE SECURITY CONCERNS IN THE CLOUD Nov 29, 2021 Should your organization move your database to the cloud? How well can cloud security concerns be mitigated? * TAPPING ON THE FIVE PILLARS OF THE ZERO TRUST MODEL May 21, 2021 SPONSORED CONTENT VALUABLE INSIGHTS INTO CYBERSECURITY, DATA PROTECTION, AND DISASTER RECOVERY STORY HEALTHCARE AND PHARMACEUTICAL CYBER-THREAT 2021 REPORT WHITE PAPER SELLING ENTERPRISE NETWORK ACCESS ON THE DARK WEB WHITE PAPER WHAT BUSINESS LEADERS NEED TO KNOW ABOUT DATA LEAKAGE WHITE PAPER GRACE IMPLEMENTS CHECK POINT SOLUTIONS FOR COMPREHENSIVE PROTECTION CASE STUDY CISOS UNDER SIEGE: 3 SIMPLE STRATEGIES TO GAIN CYBERSECURITY CONTROL STORY ADOPT A COMPREHENSIVE RANSOMWARE STRATEGY BEFORE IT IS TOO LATE STORY APAC COMPANIES PRIORITIZE ‘ZERO TRUST’ NOW MORE THAN EVER WHITE PAPER ASIA PACIFIC DIGITAL TRUST STATUS WHITE PAPER HOW TRUST, CONVENIENCE AND SPEED IMPROVE EXPERIENCES STORY WHAT YOU NEED TO KNOW ABOUT AUTOMOTIVE CYBERSECURITY COMPLIANCE STANDARDS WHITE PAPER ALL YOU NEED TO KNOW ABOUT THE DARK WEB WHITE PAPER 2021 CLOUD PROTECTION TRENDS REPORT WHITE PAPER HOW AN INSURANCE GIANT SECURES INNOVATION IN THE CLOUD CASE STUDY THE FORRESTER WAVE Q3 IDAAS ENTERPRISE REPORT WHITE PAPER INTEGRATING DATA PROTECTION AND SECURITY FOR CYBER-RESILIENCE WHITE PAPER DON’T GET CAUGHT ASSUMING STORY TMG SYDNEY UPLIFTS DATA SECURITY FOR THE SMB MARKET CASE STUDY HOW TO PROTECT REMOTE WORKFORCE AGAINST CYBER-ATTACKS STORY SECURING DATA WITH QUANTUM KEY DISTRIBUTION: A DEATH KNELL TO CYBER ATTACKERS? STORY AI-BASED EDR: ONE SIZE DOES NOT FIT ALL STORY LEVEL UP: RANSOMWARE PROTECTION STRATEGIES WHITE PAPER SD-WAN IN THE AGE OF DIGITAL TRANSFORMATION WHITE PAPER THE RISE OF RANSOMWARE WHITE PAPER CRITICAL CAPABILITIES FOR WAN EDGE INFRASTRUCTURE WHITE PAPER GLOBAL THREAT LANDSCAPE REPORT A SEMIANNUAL REPORT BY FORTIGUARD LABS WHITE PAPER INFOGRAPHICS: 2021 THALES ACCESS MANAGEMENT APAC INDEX CASE STUDY 2021 THALES ACCESS MANAGEMENT INDEX: APAC EDITION CASE STUDY STOP REACTING, START STRATEGIZING WHITE PAPER SECURE THE DEVOPS LIFECYCLE WITH CONTINUOUS TRUST WHITE PAPER BEST PRACTICES FOR CLOUD DATA PROTECTION AND KEY MANAGEMENT WHITE PAPER RANSOMWARE – A GROWING ENTERPRISE THREAT WHITE PAPER THREAT INTELLIGENCE: DARKSIDE RANSOMWARE WHITE PAPER STAYING CURRENT IS KEY FOR SECURITY IN BUSINESSES STORY QUICK GUIDE: ENABLE & SECURE YOUR REMOTE WORKFORCE WHITE PAPER A ZERO TRUST APPROACH TO SECURE ACCESS WHITE PAPER M1 FUTURE-PROOFS ITS INFRASTRUCTURE WITH UNIFIED VISIBILITY ACROSS CLOUD, NETWORK AND ENDPOINTS CASE STUDY SREI TAKES TO THE CLOUD WITH SECURE CONFIDENCE CASE STUDY THE TOP 5 REMOTE ACCESS PROBLEMS WHITE PAPER THE TRUE COST OF FREE WHITE PAPER E-BOOK: ADVANCED ANALYSIS OF DATA NETWORK TRAFFIC WHITE PAPER ARE LEGACY ROUTERS PUTTING YOUR CLOUD TRANSFORMATION AT RISK? WHITE PAPER SIMPLIFY AND ENHANCE MULTI-CLOUD APPLICATIONS WITH FORTINET SECURE SD-WAN WHITE PAPER BEAT RANSOMWARE: EDUCATION, IMPLEMENTATION, AND REMEDIATION STORY 2021 MODERN DATA PROTECTION BEST PRACTICES STORY KEEPING SURGING CYBER THREATS AT BAY IN THE NEW NORMAL STORY IAAS PROVIDER IMPROVES CLIENT TROUBLESHOOTING WITH NETWORK VISIBILITY CASE STUDY SEGA MOVES FASTER WITH FLOW-BASED NETWORK MONITORING CASE STUDY RANSOMWARE – THE EXPLODING CYBER-THREAT WHITE PAPER SECURING SMART BUILDINGS: DO YOU KNOW THE RISKS? WHITE PAPER 3 MUST-HAVES FOR SECURE, PRODUCTIVE REMOTE WORK INFOGRAPHIC A MULTI-CLOUD IT INFRASTRUCTURE DEMANDS 3 KEY REQUIREMENTS WHITE PAPER A GUIDE TO AUTOMATING THREAT DETECTION WITH MITRE ATT&CK WHITE PAPER TRACK AN ATTACK ON CRITICAL INFRASTRUCTURE VIDEO THE STORY UNRAVELS – EVOLUTION OF ENDPOINT SECURITY STORY NTT PROTECTS CUSTOMERS AND EMPLOYEES WITH CISCO UMBRELLA VIDEO GARTNER’S MAGIC QUADRANT FOR APPLICATION SECURITY TESTING (AST) WHITE PAPER 4 KEY APPLICATION EXPERIENCE MONITORING TECHNOLOGIES YOU CANNOT IGNORE VIDEO WHAT DOES A NEXT-GENERATION MDR SERVICE LOOK LIKE? WHITE PAPER HOW ORGANIZATIONS PROTECT AGAINST RANSOMWARE VIDEO PERIL IN A PANDEMIC: THE STATE OF MOBILE APPLICATION SECURITY WHITE PAPER BMW MOTORSPORT: IMPORTANCE OF DATA VIDEO QUANTUM COMPUTING & QUANTUM-SAFE SECURITY WHITE PAPER EXECUTIVE GUIDE TO THE 2020 APAC THREAT INTELLIGENCE REPORT WHITE PAPER SECURITY NEEDS TO START WITH A FABRIC WHITE PAPER 2021 OPEN SOURCE SECURITY AND RISK ANALYSIS REPORT WHITE PAPER USING ‘ZERO TRUST’ TO ENABLE SECURE REMOTE ACCESS WHITE PAPER DESIGNING SECURITY FOR REMOTE-WORK-FIRST ENTERPRISES WHITE PAPER DYNAMIC SHELLCODE PROTECTION: WAY TO DEFEND AGAINST COVERT CODE TRYING TO RUN IN MEMORY STORY PREVENTING RANSOMWARE ATTACKS FROM DISRUPTING YOUR BUSINESS WHITE PAPER BUILDING THE FOUNDATION FOR DIGITAL TRUST WHITE PAPER THE 5 ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SOC WHITE PAPER THE ‘GOLDILOCKS’ SECURITY OPERATIONS ARCHITECTURE CASE STUDY 2020 REMOTE WORK-FROM-HOME CYBERSECURITY REPORT WHITE PAPER CYBERCHAT BETWEEN PROFICIO AND SPLUNK VIDEOWHITE PAPER DATA SECURITY PREDICTIONS 2021 WHITE PAPER MDR CHECKLIST FOR YOUR SPLUNK ENVIRONMENT WHITE PAPER APPLICATION SECURITY IN THE DEVOPS ENVIRONMENT WHITE PAPER TOKENIZATION HELPS INDONESIAN FINANCIAL TECHNOLOGY AND SERVICE PROVIDER WITH PCI COMPLIANCE WHITE PAPER WEBINAR: THE 2021 THREAT FORECAST VIDEOWHITE PAPER 2020 GARTNER MAGIC QUADRANT FOR APPLICATION SECURITY TESTING WHITE PAPER 2020 OPEN SOURCE SECURITY AND RISK ANALYSIS REPORT WHITE PAPER CHOOSING THE RIGHT MESSAGING AND COLLABORATION SOLUTION FOR YOUR BUSINESS WHITE PAPER CONTINUOUS SECURITY – PUTTING IT ALL TOGETHER WHITE PAPER CONTINUOUS APPLICATION SECURITY WITH HCL APPSCAN WHITE PAPER CYBERSECURITY: LOOKING AT 2021 WITH BLACKBERRY VIDEO KOREAN HOSPITAL OPTS FOR VORMETRIC TRANSPARENT ENCRYPTION TO ENHANCE SECURITY WHITE PAPER WEBINAR: CHOOSING THE RIGHT SECURE MESSAGING SOLUTION FOR YOUR BUSINESS VIDEOWHITE PAPER THE STATE OF THE SECURITY TEAM WHITE PAPER UNTANGLING THE WEB OF CLOUD SECURITY THREATS WHITE PAPER THE ULTIMATE GUIDE TO CSPM WHITE PAPER WEBINAR: BEST PRACTICES FOR TELEWORKERS AT SCALE VIDEOWHITE PAPER MAXIMIZE THE ROI OF DETECTION AND RESPONSE WHITE PAPER HEALTHCARE ORGANIZATION ADDRESSES CLOUD ACCESS MANAGEMENT CHALLENGES WHITE PAPER AN ACTIONABLE GUIDE TO COMPLYING WITH MALAYSIA’S RISK MANAGEMENT IN TECHNOLOGY (RMIT) WHITE PAPER THE 5 CRITICAL STEPS IN YOUR ENDPOINT SECURITY STRATEGY WHITE PAPER 3 TIPS FOR CHOOSING A NEXT-GENERATION FIREWALL FOR SMALL BUSINESSES WHITE PAPER SECURE REMOTE ACCESS FOR YOUR WORKFORCE AT SCALE WHITE PAPER KEY CONSIDERATIONS FOR IMPLEMENTING SECURE TELEWORK AT SCALE WHITE PAPER 4 TRENDING PHISHING TECHNIQUES AND TIPS FOR DETECTION WHITE PAPER SECURITY OPERATIONS MATURITY MODEL WHITE PAPER IDAPTIVE REDUCES COMPLEXITY, INCREASES SECURITY FOR NZ AGRICULTURAL ORGANIZATION CASE STUDY THE CISO’S GUIDE TO MODERN APPSEC WHITE PAPER MODERN APPLICATION DEVELOPMENT SECURITY WHITE PAPER SOLVING SECURE TELEWORK REQUIREMENTS FOR ‘SUPER USERS’ WHITE PAPER DELIVER SECURITY AND PERFORMANCE FOR THE MOST DEMANDING REMOTE WORKERS WHITE PAPER THE PIVOTAL ROLE OF HR IN CYBERSECURITY STORY 7 BENEFITS OF CLOUD EMAIL SECURITY STORY WALLEX UPS ITS SECURITY POSTURE WHITE PAPER HOW ZAVE BUILT CYBER RESILIENCE, PROTECT CUSTOMER DATA ON AWS WHITE PAPER GNOWBE ELEVATES PLATFORM SECURITY FOR LEARNING PARTNERS AND END-USERS WHITE PAPER 6 IT SECURITY RISKS IN A PERIMETERLESS WORLD WHITE PAPER 5 TIPS FOR CHOOSING A NEXT-GENERATION FIREWALL WHITE PAPER ARE WE READY FOR THE NEXT BIG BREACH? CASE STUDY TOP 10 CONSIDERATIONS WHEN CHOOSING A MODERN SINGLE SIGN-ON SOLUTION WHITE PAPER IDAAS BUYERS’ GUIDE WHITE PAPER BLACKBERRY SECURES 96% OF THE ENTERPRISE IOT THREAT LANDSCAPE STORY SPEAR PHISHING: TOP THREATS AND TRENDS (VOL 4) WHITE PAPER SENSITIVE DATA PROTECTION IN THE RETAIL CARD PAYMENTS ECOSYSTEM WHITE PAPER A COMPREHENSIVE GUIDE TO AUTHENTICATION TECHNOLOGIES AND METHODS WHITE PAPER A COMPREHENSIVE GUIDE TO SECURING DATA WITH DATABASE ENCRYPTION WHITE PAPER ENTERPRISE KEY MANAGEMENT SOLUTIONS WHITE PAPER UPGRADING EXISTING SECURITY SYSTEMS TO BECOME AGILE QUANTUM-SAFE WHITE PAPER PREPARING FOR WHAT’S NEXT: INNOVATION ALSO BRINGS CYBERSECURITY RISK STORY 2020 VULNERABILITY AND THREAT TRENDS-MID-YEAR UPDATE WHITE PAPER THE GUIDE TO JUST-IN-TIME PRIVILEGED ACCESS MANAGEMENT WHITE PAPER QUICK GUIDE- ENABLE & SECURE YOUR REMOTE WORKFORCE WHITE PAPER EMAIL SECURITY THREAT REPORT 2020 CASE STUDY CYBER AI FOR SAAS SECURITY: PROTECTING YOUR DYNAMIC WORKFORCE WHITE PAPER SPEAR PHISHING: TOP THREATS AND TRENDS (VOL 3) WHITE PAPER 13 EMAIL THREAT TYPES TO KNOW ABOUT RIGHT NOW WHITE PAPER MARKET ANALYSIS: CLOSING BACKUP AND RECOVERY GAPS WHITE PAPER LEADING MALAYSIAN DEVELOPER ZEROES IN ON THREATS WITH LOGRHYTHM CASE STUDY SECURE SD-WAN: THE LAUNCH PAD INTO CLOUD WHITE PAPER THE NEW REALITY: BRINGING ORDER TO CHAOS WHITE PAPER CLOUD TRENDS REPORT WHITE PAPER 2020 VULNERABILITY & THREAT TRENDS REPORT WHITE PAPER LOGRHYTHM NAMED A LEADER IN 2020 GARTNER SIEM MAGIC QUADRANT CASE STUDY THE LOGRHYTHM SECURITY OPERATIONS MATURITY MODEL WHITE PAPER HOW SMES CAN QUICKLY AND COST-EFFECTIVELY DEPLOY DEFENSES AGAINST CYBERTHREATS STORY WORRY-FREE ENDPOINT PROTECTION FOR SMES STORY HOW TO PROTECT YOUR BUSINESS IN THE DIGITAL ECONOMY STORY GROUP-IB’S CYBERCRIMECON EVENT MAKES FULL-FLEDGED DEBUT IN SINGAPORE STORY PreviousNext RANSOMWARE ATTACKS & ENTERPRISE RESPONSE IN APAC Jul 29, 2021 TRACK AN ATTACK ON CRITICAL INFRASTRUCTURE Jun 28, 2021 NTT PROTECTS CUSTOMERS AND EMPLOYEES WITH CISCO UMBRELLA Jun 14, 2021 4 KEY APPLICATION EXPERIENCE MONITORING TECHNOLOGIES YOU CANNOT IGNORE Jun 14, 2021 PreviousNext 1234 INFOGRAPHICS WIDESPREAD IMPACT OF RANSOMWARE IN ASIA PACIFIC Feb 4, 2022 4 in 5 organizations in Asia Pacific affected by ransomware, with more than half paying the ransom. * HACKERS INCREASINGLY TARGETING ZERO-DAY VULNERABILITIES, SUPPLY CHAIN NETWORKS FOR MAXIMUM IMPACT Feb 4, 2022 CYBER INTELLIGENCE Latest RANSOMWARE – A GROWING ENTERPRISE THREAT By CrowdStrike | Sep 22, 2021 A deep dive into ransomware's evolution, why businesses can't afford to ignore it, and what we can do about it. * GROUP-IB HELPED INTERPOL IN OPERATION LYREBIRD ARREST By CybersecAsia editors | Jul 13, 2021 * A GUIDE TO AUTOMATING THREAT DETECTION WITH MITRE ATT&CK By LogRhythm | Jun 29, 2021 * SECURING DIGITAL PAYMENTS GROWING TRICKIER FOR THE FINANCIAL SECTOR By CybersecAsia editors | Jun 28, 2021 CYBER WARFARE Latest SPY VS SPY: BATTLING THE UNSEEN GLOBAL PERSISTENT THREATS OF US-CHINA TENSIONS By Carlo Cordova | Aug 30, 2021 Beneath the veneer of global APT attacks lies a complex crossfire of political enmity, perfidy and cyber greed. Manchurian candidates, anyone? * UNDERSTANDING MYANMAR’S INTENSIFYING DIGITAL DISRUPTIONS By CybersecAsia editors | Apr 7, 2021 * CYBER MURDER MYSTERY By Check Point Software Technologies | May 21, 2020 * CYBER-DEFENDING OUR NATIONAL AIRSPACE By Victor Ng | Jan 15, 2020 MOST READ THE FUTURE OF DIGITAL IDENTITIES AND DIGITAL TRUST In the digital economy, businesses and individuals need digital trust – by ensuring portable and verifiable digital identities and credentials, while protecting privacy. * THREAT ACTORS ARE TEACHING OLD MALWARE NEW TRICKS * THE WORLD’S LARGEST EXPORTER OF IT WORKERS HAS A CYBER SKILLS SHORTAGE * IDENTITY SECURITY IN THE HYBRID WORK & CLOUD ERA * CYBERSECASIA READERS RECOGNIZE ASIA PACIFIC’S LEADERS IN CYBERSECURITY * “GOOD RAIN KNOWS THE BEST TIME TO FALL”: FRAUDSTER MOTTO GARTNER’S MAGIC QUADRANT FOR APPLICATION SECURITY TESTING (AST) Integrating application security into your software development process is critical, but figuring out where to start can be confusing. Downloading Gartner’s Magic Quadrant for Application Security Testing (AST) is a smart place to start. * SECURING DATA WITH QUANTUM KEY DISTRIBUTION: A DEATH KNELL TO CYBER ATTACKERS? * VENDOR OF PRIVATE HEALTHCARE GROUP IN SINGAPORE SUFFERS DATA BREACH * RANSOMWARE: HOW YOUR DATA CAN BE YOUR BEST DEFENSE * THE FORRESTER WAVE Q3 IDAAS ENTERPRISE REPORT * HOW AN INSURANCE GIANT SECURES INNOVATION IN THE CLOUD Search for: GAMIFICATION LISTING PARTICIPATE NOW SPONSORS-RCA BeyondTrust Hillstone Fortinet Synopsys Claroty Kaspersky Nexusguard Nexusguard Nexusguard Nexusguard Nexusguard Nexusguard Nexusguard Nexusguard Exabeam Ivanti POLLING -------------------------------------------------------------------------------- * FEATURE: From Zero Trust to Zero Touch * VIDEOS: The spark that unifies endpoint security management * CASE STUDY: Government agency escapes a cyberattack while trialing an AI security solution * MORE... WHITEPAPERS * HEALTHCARE AND PHARMACEUTICAL CYBER-THREAT 2021 REPORT Monday, January 24, 2022 Healthcare and pharmaceutical cyber-threat 2021 report Specific cyber-threats in the healthcare and pharmaceutical sector to …Read More » * SELLING ENTERPRISE NETWORK ACCESS ON THE DARK WEB Monday, January 24, 2022 Why and how cybercriminals compromise and sell enterprise network access detailsRead More » * WHAT BUSINESS LEADERS NEED TO KNOW ABOUT DATA LEAKAGE Monday, January 24, 2022 Ransomware strikes fear to business leadersRead More » * APAC COMPANIES PRIORITIZE ‘ZERO TRUST’ NOW MORE THAN EVER Monday, January 10, 2022 How Asian companies accelerate in prioritising zero trustRead More » CASE STUDIES * GRACE IMPLEMENTS CHECK POINT SOLUTIONS FOR COMPREHENSIVE PROTECTION A leading manufacturing company uses Check Point solutions to simplify and secure data and business …Read more * INDONESIA’S LARGEST BANK TAPS ADVANCED NDR FOR TIGHTER CYBERSECURITY In addition to keeping pace with regional cyberattack trends and accelerated industry digitalization, the bank …Read more * HOW AN INSURANCE GIANT SECURES INNOVATION IN THE CLOUD An insurance company secures innovation using multi-cloudRead more * TMG SYDNEY UPLIFTS DATA SECURITY FOR THE SMB MARKET TMG Sydney protects client data of SMB businesses with affordable, reliable OneXafe SoloRead more * Home * About Us * Contact Us * Sitemap * Privacy & Cookies * Terms of Use * Advertising & Reprint Policy * Media Kit * Subscribe * Manage Subscriptions * Newsletter Copyright © 2022 CybersecAsia All Rights Reserved. * * * * * Search for: magic_popup_2 Please correct the marked field(s) below. Thank you for signing Up