www.cybersecasia.net Open in urlscan Pro
18.140.38.73  Public Scan

Submitted URL: http://www.cybersecasia.net/
Effective URL: https://www.cybersecasia.net/
Submission: On February 07 via api from SG — Scanned from DE

Form analysis 3 forms found in the DOM

GET https://www.cybersecasia.net/

<form data-min-no-for-search="1" data-result-box-max-height="400" data-form-id="9137" class="is-search-form is-form-style-default is-form-id-9137 is-ajax-search" action="https://www.cybersecasia.net/" method="get" role="search"><label
    for="is-search-input-9137"><span class="is-screen-reader-text">Search for:</span><input type="search" id="is-search-input-9137" name="s" value="" class="is-search-input" placeholder="Search here..." autocomplete="off"><span
      class="is-loader-image" style="display: none;background-image:url(https://www.cybersecasia.net/wp-content/plugins/add-search-to-menu/public/images/spinner.gif);"></span></label><input type="submit" value="Search" class="is-search-submit"><input
    type="hidden" name="post_type" value="post"></form>

GET https://www.cybersecasia.net/

<form data-min-no-for-search="1" data-result-box-max-height="400" data-form-id="9137" class="is-search-form is-form-style-default is-form-id-9137 is-ajax-search" action="https://www.cybersecasia.net/" method="get" role="search"><label
    for="is-search-input-9137"><span class="is-screen-reader-text">Search for:</span><input type="search" id="is-search-input-9137" name="s" value="" class="is-search-input" placeholder="Search here..." autocomplete="off"><span
      class="is-loader-image" style="display: none;background-image:url(https://www.cybersecasia.net/wp-content/plugins/add-search-to-menu/public/images/spinner.gif);"></span></label><input type="submit" value="Search" class="is-search-submit"><input
    type="hidden" name="post_type" value="post"></form>

POST https://ma.zoho.com/weboptin.zc

<form class="zh_formcont" method="POST" id="zcampaignOptinForm" target="_zcSignup" action="https://ma.zoho.com/weboptin.zc">
  <div style="padding-right: 50px; box-sizing: border-box">
    <div style="background-color: rgb(255, 235, 232); padding: 10px; color: rgb(210, 0, 0); font-size: 11px; margin: 0px 15px 0px; border: 1px solid rgb(255, 217, 211); display: none; width: 100%" id="errorMsgDiv"> &nbsp;&nbsp;Please correct the
      marked field(s) below. </div>
  </div>
  <div class="zh_frominpcont" style="width: 313px; height: 43px"> <input type="text" class="zh_forminput csrdrag" name="LASTNAME" changetype="LASTNAME" changeitem="SIGNUP_FORM_FIELD" id="LASTNAME" placeholder="FULL NAME" autocomplete="off"
      style="left: -14px; top: 105px; color: rgb(146, 146, 144); font-family: Arial; font-size: 15px; border-width: 2px; border-color: rgb(255, 255, 255)"> </div>
  <div class="zh_frominpcont" style="width: 313px; height: 43px"> <input type="text" class="zh_forminput csrdrag" name="CONTACT_EMAIL" changetype="CONTACT_EMAIL" changeitem="SIGNUP_FORM_FIELD" id="CONTACT_EMAIL" placeholder="WORK EMAIL"
      autocomplete="off" style="left: -13px; top: 102px; font-size: 15px; border-color: rgb(255, 255, 255)"> </div>
  <div class="zh_frombtncont" style="width: 298px; height: 50px"> <input class="zh_forminputbtn csrdrag" type="button" value="SUBSCRIBE" name="SIGNUP_SUBMIT_BUTTON" changetype="SIGNUP_SUBMIT_BUTTON" id="zcWebOptin"
      style="position: relative; left: -12px; top: 100px; background-color: rgb(235, 31, 32); border-width: 1px; font-size: 18px; padding: 0px !important; border-color: rgb(235, 31, 32)"> </div>
  <div>
    <!-- Do not edit the below Zoho Campaigns hidden tags -->
    <input type="hidden" id="fieldBorder" value="rgb(255, 255, 255)" onload=""><input type="hidden" name="zc_trackCode" id="zc_trackCode" value="ZCFORMVIEW"><input type="hidden" id="submitType" name="submitType" value="optinCustomView">
    <input type="hidden" name="zx" id="cmpZuid" value="12986efb5">
    <input type="hidden" name="zcvers" value="2.0"><input type="hidden" id="mode" name="mode" value="OptinCreateView"><input type="hidden" id="document_domain" value=""><input type="hidden" id="zc_Url" value="cped.maillist-manage.com">
    <input type="hidden" id="new_optin_response_in" value="0">
    <input type="hidden" id="duplicate_optin_response_in" value="0">
    <input type="hidden" id="zcFormType" value="EGFORM">
    <input type="hidden" id="zc_formIx" name="zc_formIx" value="3z4440bab079297021cda8e791b86bef8e0044f59b1cac535ee61b4d03a4c63e38">
    <!-- End of the campaigns hidden tags -->
    <input type="hidden" id="popupType" value="1">
    <input type="hidden" id="ZCMP_close" value="1">
  </div><input type="text" style="display:none !important;" name="qs" class="ih"><input type="text" style="display:none !important;" name="lf" class="ih" value="1644204050969"><input type="hidden" name="di" value="1144032199171412881644204050970">
</form>

Text Content

Our website uses cookies to provide you with personalized content and for site
analysis. If you continue to use the site without choosing your preference,
we'll assume that you're fine with cookies.+


CYBERSECURITY NEWS IN ASIA

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Are organizations doing enough to secure remote-workers and corporate ...
Financial sector was most targeted in Q3 2021: report
Widespread impact of ransomware in Asia Pacific
Hackers increasingly targeting zero-day vulnerabilities, supply chain ...
Combatting financial fraud in four data-driven ways
 * 
 * 
 * 
 * 
 * 

LOGIN REGISTER
 * Features
   
   
   * FEATURED
     
     
     ARE ASIA’S REAL ESTATE INDUSTRIES FAIR GAME TO CYBERCRIMINALS AND APTS?
     
     Friday, January 28, 2022, 5:01 PM Asia/Singapore | Features, Newsletter
   
   
   * FEATURED
     
     
     FROM INDUSTRY 4.0 TO PHARMA 4.0: TOWARDS SAFER AND MORE SUSTAINABLE
     INDUSTRIAL PRODUCTION
     
     Monday, January 24, 2022, 8:43 AM Asia/Singapore | Features, Newsletter
   
   
   * FEATURED
     
     
     PLUGGING THE GAP BETWEEN WEB APPLICATION FIREWALLS AND PERIMETER CONTROLS:
     RASP
     
     Friday, January 21, 2022, 8:56 AM Asia/Singapore | Features, Newsletter
 * News
   
   
   * FEATURED
     
     
     ARE ORGANIZATIONS DOING ENOUGH TO SECURE REMOTE-WORKERS AND CORPORATE
     ASSETS?
     
     Friday, February 4, 2022, 5:11 PM Asia/Singapore | News, Newsletter
   
   
   * FEATURED
     
     
     FINANCIAL SECTOR WAS MOST TARGETED IN Q3 2021: REPORT
     
     Friday, February 4, 2022, 5:05 PM Asia/Singapore | News, Newsletter
   
   
   * FEATURED
     
     
     LOGISTICS GIANT WAS THE MOST IMPERSONATED BRAND USED IN Q4 2021 PHISHING
     CAMPAIGNS
     
     Friday, February 4, 2022, 2:59 PM Asia/Singapore | News, Newsletter
 * Opinions
 * Tips
 * Whitepapers
 * Awards
 * Directory
 * 

Select Page

 * 
 * 
 * 
 * 
 * 

LOGIN REGISTER
 * Features
   
   
   * FEATURED
     
     
     ARE ASIA’S REAL ESTATE INDUSTRIES FAIR GAME TO CYBERCRIMINALS AND APTS?
     
     Friday, January 28, 2022, 5:01 PM Asia/Singapore | Features, Newsletter
   
   
   * FEATURED
     
     
     FROM INDUSTRY 4.0 TO PHARMA 4.0: TOWARDS SAFER AND MORE SUSTAINABLE
     INDUSTRIAL PRODUCTION
     
     Monday, January 24, 2022, 8:43 AM Asia/Singapore | Features, Newsletter
   
   
   * FEATURED
     
     
     PLUGGING THE GAP BETWEEN WEB APPLICATION FIREWALLS AND PERIMETER CONTROLS:
     RASP
     
     Friday, January 21, 2022, 8:56 AM Asia/Singapore | Features, Newsletter
 * News
   
   
   * FEATURED
     
     
     ARE ORGANIZATIONS DOING ENOUGH TO SECURE REMOTE-WORKERS AND CORPORATE
     ASSETS?
     
     Friday, February 4, 2022, 5:11 PM Asia/Singapore | News, Newsletter
   
   
   * FEATURED
     
     
     FINANCIAL SECTOR WAS MOST TARGETED IN Q3 2021: REPORT
     
     Friday, February 4, 2022, 5:05 PM Asia/Singapore | News, Newsletter
   
   
   * FEATURED
     
     
     LOGISTICS GIANT WAS THE MOST IMPERSONATED BRAND USED IN Q4 2021 PHISHING
     CAMPAIGNS
     
     Friday, February 4, 2022, 2:59 PM Asia/Singapore | News, Newsletter
 * Opinions
 * Tips
 * Whitepapers
 * Awards
 * Directory
 * 




CYBERSECURITY NEWS IN ASIA


ARE ASIA’S REAL ESTATE INDUSTRIES FAIR GAME TO CYBERCRIMINAL...

By Balasubramanian Swaminathan, IMAWS | Jan 28, 2022


FROM INDUSTRY 4.0 TO PHARMA 4.0: TOWARDS SAFER AND MORE SUST...

By Carlo Cordova | Jan 24, 2022


PLUGGING THE GAP BETWEEN WEB APPLICATION FIREWALLS AND PERIM...

By Anamika Sahu | IMAWS | Jan 21, 2022


CAN TOO MUCH CYBER PRODUCT INFO WAYLAY FINANCIAL SECTOR CXOS...

By Anamika Sahu | IMAWS | Jan 14, 2022


FROM REACTIVE RECOVERY TO PROACTIVE PROTECTION

By Victor Ng | Dec 17, 2021


WHAT YOUR INDUSTRY DOESN’T KNOW CAN HURT YOU MOST

By Victor Ng | Dec 16, 2021

PreviousNext
123456



SECURITY NEWS


ARE ORGANIZATIONS DOING ENOUGH TO SECURE REMOTE-WORKERS AND CORPORATE ASSETS?

Feb 4, 2022

Balancing worker productivity and corporate security in remote- and
hybrid-working arrangements can be challenging.


 * FINANCIAL SECTOR WAS MOST TARGETED IN Q3 2021: REPORT
   
   Feb 4, 2022


 * LOGISTICS GIANT WAS THE MOST IMPERSONATED BRAND USED IN Q4 2021 PHISHING
   CAMPAIGNS
   
   Feb 4, 2022


 * BEWARE: DEFI AND CRYPTO SCAMMERS ARE OUT TO GET YOU
   
   Jan 28, 2022


EXPERT OPINIONS


MICROSERVICES, SUPPLY CHAIN SECURITY WILL BE 2022 APAC PRIORITIES

Dec 30, 2021

In addition, this expert foresees continued cyber exploitation of pandemic
anxieties, as well as two other trends to watch for


 * ANOTHER YEAR LIKE 2021, BUT WORSE: DATA PROTECTION/MANAGEMENT TRENDS 2022
   
   Dec 28, 2021


 * WILL 2022 BE A YEAR OF HUMAN-FOCUSED CYBER AWARENESS?
   
   Dec 27, 2021


 * BEYOND CYBER PROTECTION: CYBER RESILIENCE AS A CORNERSTONE OF ECONOMIC
   RECOVERY
   
   Dec 20, 2021


TIPS


COMBATTING FINANCIAL FRAUD IN FOUR DATA-DRIVEN WAYS

Feb 4, 2022

After two years of battering, the banking and financial services industry will
use data to preempt and protect itself in APAC.


 * DIGITALIZATION HAS ESCALATE CONSUMER EXPECTATIONS OF DATA PRIVACY: DEAL WITH
   IT!
   
   Jan 31, 2022


 * HOW TO GET EVERYONE IN THE ORGANIZATION TO BE A RISK MANAGEMENT STAKEHOLDER
   
   Jan 31, 2022


 * SHOULD DATA PRIVACY BE COMMEMORATED AT ALL?
   
   Jan 27, 2022

CYBERSECURITY: LOOKING BACK 2021 | LOOKING AHEAD 2022

IDENTITY SECURITY IN THE HYBRID WORK & CLOUD ERA

Ransomware Attack & Enterprise Response in APAC

Panel discussion: transforming your WAN and security for successful
transformation

Overcoming cybersecurity challenges in the digital transformation journey

Overcoming cybersecurity challenges in the digital transformation journey

Overcoming cybersecurity challenges in the digital transformation journey






CLOUD SECURITY


DATABASE SECURITY CONCERNS IN THE CLOUD

Nov 29, 2021

Should your organization move your database to the cloud? How well can cloud
security concerns be mitigated?


 * TAPPING ON THE FIVE PILLARS OF THE ZERO TRUST MODEL
   
   May 21, 2021


SPONSORED CONTENT




VALUABLE INSIGHTS INTO CYBERSECURITY, DATA PROTECTION, AND DISASTER RECOVERY
STORY


HEALTHCARE AND PHARMACEUTICAL CYBER-THREAT 2021 REPORT WHITE PAPER


SELLING ENTERPRISE NETWORK ACCESS ON THE DARK WEB WHITE PAPER


WHAT BUSINESS LEADERS NEED TO KNOW ABOUT DATA LEAKAGE WHITE PAPER


GRACE IMPLEMENTS CHECK POINT SOLUTIONS FOR COMPREHENSIVE PROTECTION CASE STUDY


CISOS UNDER SIEGE: 3 SIMPLE STRATEGIES TO GAIN CYBERSECURITY CONTROL STORY


ADOPT A COMPREHENSIVE RANSOMWARE STRATEGY BEFORE IT IS TOO LATE STORY


APAC COMPANIES PRIORITIZE ‘ZERO TRUST’ NOW MORE THAN EVER WHITE PAPER


ASIA PACIFIC DIGITAL TRUST STATUS WHITE PAPER


HOW TRUST, CONVENIENCE AND SPEED IMPROVE EXPERIENCES STORY


WHAT YOU NEED TO KNOW ABOUT AUTOMOTIVE CYBERSECURITY COMPLIANCE STANDARDS WHITE
PAPER


ALL YOU NEED TO KNOW ABOUT THE DARK WEB WHITE PAPER


2021 CLOUD PROTECTION TRENDS REPORT WHITE PAPER


HOW AN INSURANCE GIANT SECURES INNOVATION IN THE CLOUD CASE STUDY


THE FORRESTER WAVE Q3 IDAAS ENTERPRISE REPORT WHITE PAPER


INTEGRATING DATA PROTECTION AND SECURITY FOR CYBER-RESILIENCE WHITE PAPER


DON’T GET CAUGHT ASSUMING STORY


TMG SYDNEY UPLIFTS DATA SECURITY FOR THE SMB MARKET CASE STUDY


HOW TO PROTECT REMOTE WORKFORCE AGAINST CYBER-ATTACKS STORY


SECURING DATA WITH QUANTUM KEY DISTRIBUTION: A DEATH KNELL TO CYBER ATTACKERS?
STORY


AI-BASED EDR: ONE SIZE DOES NOT FIT ALL STORY


LEVEL UP: RANSOMWARE PROTECTION STRATEGIES WHITE PAPER


SD-WAN IN THE AGE OF DIGITAL TRANSFORMATION WHITE PAPER


THE RISE OF RANSOMWARE WHITE PAPER


CRITICAL CAPABILITIES FOR WAN EDGE INFRASTRUCTURE WHITE PAPER


GLOBAL THREAT LANDSCAPE REPORT A SEMIANNUAL REPORT BY FORTIGUARD LABS WHITE
PAPER


INFOGRAPHICS: 2021 THALES ACCESS MANAGEMENT APAC INDEX CASE STUDY


2021 THALES ACCESS MANAGEMENT INDEX: APAC EDITION CASE STUDY


STOP REACTING, START STRATEGIZING WHITE PAPER


SECURE THE DEVOPS LIFECYCLE WITH CONTINUOUS TRUST WHITE PAPER


BEST PRACTICES FOR CLOUD DATA PROTECTION AND KEY MANAGEMENT WHITE PAPER


RANSOMWARE – A GROWING ENTERPRISE THREAT WHITE PAPER


THREAT INTELLIGENCE: DARKSIDE RANSOMWARE WHITE PAPER


STAYING CURRENT IS KEY FOR SECURITY IN BUSINESSES STORY


QUICK GUIDE: ENABLE & SECURE YOUR REMOTE WORKFORCE WHITE PAPER


A ZERO TRUST APPROACH TO SECURE ACCESS WHITE PAPER


M1 FUTURE-PROOFS ITS INFRASTRUCTURE WITH UNIFIED VISIBILITY ACROSS CLOUD,
NETWORK AND ENDPOINTS CASE STUDY


SREI TAKES TO THE CLOUD WITH SECURE CONFIDENCE CASE STUDY


THE TOP 5 REMOTE ACCESS PROBLEMS WHITE PAPER


THE TRUE COST OF FREE WHITE PAPER


E-BOOK: ADVANCED ANALYSIS OF DATA NETWORK TRAFFIC WHITE PAPER


ARE LEGACY ROUTERS PUTTING YOUR CLOUD TRANSFORMATION AT RISK? WHITE PAPER


SIMPLIFY AND ENHANCE MULTI-CLOUD APPLICATIONS WITH FORTINET SECURE SD-WAN WHITE
PAPER


BEAT RANSOMWARE: EDUCATION, IMPLEMENTATION, AND REMEDIATION STORY


2021 MODERN DATA PROTECTION BEST PRACTICES STORY


KEEPING SURGING CYBER THREATS AT BAY IN THE NEW NORMAL STORY


IAAS PROVIDER IMPROVES CLIENT TROUBLESHOOTING WITH NETWORK VISIBILITY CASE STUDY


SEGA MOVES FASTER WITH FLOW-BASED NETWORK MONITORING CASE STUDY


RANSOMWARE – THE EXPLODING CYBER-THREAT WHITE PAPER


SECURING SMART BUILDINGS: DO YOU KNOW THE RISKS? WHITE PAPER


3 MUST-HAVES FOR SECURE, PRODUCTIVE REMOTE WORK INFOGRAPHIC


A MULTI-CLOUD IT INFRASTRUCTURE DEMANDS 3 KEY REQUIREMENTS WHITE PAPER


A GUIDE TO AUTOMATING THREAT DETECTION WITH MITRE ATT&CK WHITE PAPER


TRACK AN ATTACK ON CRITICAL INFRASTRUCTURE VIDEO


THE STORY UNRAVELS – EVOLUTION OF ENDPOINT SECURITY STORY


NTT PROTECTS CUSTOMERS AND EMPLOYEES WITH CISCO UMBRELLA VIDEO


GARTNER’S MAGIC QUADRANT FOR APPLICATION SECURITY TESTING (AST) WHITE PAPER


4 KEY APPLICATION EXPERIENCE MONITORING TECHNOLOGIES YOU CANNOT IGNORE VIDEO


WHAT DOES A NEXT-GENERATION MDR SERVICE LOOK LIKE? WHITE PAPER


HOW ORGANIZATIONS PROTECT AGAINST RANSOMWARE VIDEO


PERIL IN A PANDEMIC: THE STATE OF MOBILE APPLICATION SECURITY WHITE PAPER


BMW MOTORSPORT: IMPORTANCE OF DATA VIDEO


QUANTUM COMPUTING & QUANTUM-SAFE SECURITY WHITE PAPER


EXECUTIVE GUIDE TO THE 2020 APAC THREAT INTELLIGENCE REPORT WHITE PAPER


SECURITY NEEDS TO START WITH A FABRIC WHITE PAPER


2021 OPEN SOURCE SECURITY AND RISK ANALYSIS REPORT WHITE PAPER


USING ‘ZERO TRUST’ TO ENABLE SECURE REMOTE ACCESS WHITE PAPER


DESIGNING SECURITY FOR REMOTE-WORK-FIRST ENTERPRISES WHITE PAPER


DYNAMIC SHELLCODE PROTECTION: WAY TO DEFEND AGAINST COVERT CODE TRYING TO RUN IN
MEMORY STORY


PREVENTING RANSOMWARE ATTACKS FROM DISRUPTING YOUR BUSINESS WHITE PAPER


BUILDING THE FOUNDATION FOR DIGITAL TRUST WHITE PAPER


THE 5 ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SOC WHITE PAPER


THE ‘GOLDILOCKS’ SECURITY OPERATIONS ARCHITECTURE CASE STUDY


2020 REMOTE WORK-FROM-HOME CYBERSECURITY REPORT WHITE PAPER


CYBERCHAT BETWEEN PROFICIO AND SPLUNK VIDEOWHITE PAPER


DATA SECURITY PREDICTIONS 2021 WHITE PAPER


MDR CHECKLIST FOR YOUR SPLUNK ENVIRONMENT WHITE PAPER


APPLICATION SECURITY IN THE DEVOPS ENVIRONMENT WHITE PAPER


TOKENIZATION HELPS INDONESIAN FINANCIAL TECHNOLOGY AND SERVICE PROVIDER WITH PCI
COMPLIANCE WHITE PAPER


WEBINAR: THE 2021 THREAT FORECAST VIDEOWHITE PAPER


2020 GARTNER MAGIC QUADRANT FOR APPLICATION SECURITY TESTING WHITE PAPER


2020 OPEN SOURCE SECURITY AND RISK ANALYSIS REPORT WHITE PAPER


CHOOSING THE RIGHT MESSAGING AND COLLABORATION SOLUTION FOR YOUR BUSINESS WHITE
PAPER


CONTINUOUS SECURITY – PUTTING IT ALL TOGETHER WHITE PAPER


CONTINUOUS APPLICATION SECURITY WITH HCL APPSCAN WHITE PAPER


CYBERSECURITY: LOOKING AT 2021 WITH BLACKBERRY VIDEO


KOREAN HOSPITAL OPTS FOR VORMETRIC TRANSPARENT ENCRYPTION TO ENHANCE SECURITY
WHITE PAPER


WEBINAR: CHOOSING THE RIGHT SECURE MESSAGING SOLUTION FOR YOUR BUSINESS
VIDEOWHITE PAPER


THE STATE OF THE SECURITY TEAM WHITE PAPER


UNTANGLING THE WEB OF CLOUD SECURITY THREATS WHITE PAPER


THE ULTIMATE GUIDE TO CSPM WHITE PAPER


WEBINAR: BEST PRACTICES FOR TELEWORKERS AT SCALE VIDEOWHITE PAPER


MAXIMIZE THE ROI OF DETECTION AND RESPONSE WHITE PAPER


HEALTHCARE ORGANIZATION ADDRESSES CLOUD ACCESS MANAGEMENT CHALLENGES WHITE PAPER


AN ACTIONABLE GUIDE TO COMPLYING WITH MALAYSIA’S RISK MANAGEMENT IN TECHNOLOGY
(RMIT) WHITE PAPER


THE 5 CRITICAL STEPS IN YOUR ENDPOINT SECURITY STRATEGY WHITE PAPER


3 TIPS FOR CHOOSING A NEXT-GENERATION FIREWALL FOR SMALL BUSINESSES WHITE PAPER


SECURE REMOTE ACCESS FOR YOUR WORKFORCE AT SCALE WHITE PAPER


KEY CONSIDERATIONS FOR IMPLEMENTING SECURE TELEWORK AT SCALE WHITE PAPER


4 TRENDING PHISHING TECHNIQUES AND TIPS FOR DETECTION WHITE PAPER


SECURITY OPERATIONS MATURITY MODEL WHITE PAPER


IDAPTIVE REDUCES COMPLEXITY, INCREASES SECURITY FOR NZ AGRICULTURAL ORGANIZATION
CASE STUDY


THE CISO’S GUIDE TO MODERN APPSEC WHITE PAPER


MODERN APPLICATION DEVELOPMENT SECURITY WHITE PAPER


SOLVING SECURE TELEWORK REQUIREMENTS FOR ‘SUPER USERS’ WHITE PAPER


DELIVER SECURITY AND PERFORMANCE FOR THE MOST DEMANDING REMOTE WORKERS WHITE
PAPER


THE PIVOTAL ROLE OF HR IN CYBERSECURITY STORY


7 BENEFITS OF CLOUD EMAIL SECURITY STORY


WALLEX UPS ITS SECURITY POSTURE WHITE PAPER


HOW ZAVE BUILT CYBER RESILIENCE, PROTECT CUSTOMER DATA ON AWS WHITE PAPER


GNOWBE ELEVATES PLATFORM SECURITY FOR LEARNING PARTNERS AND END-USERS WHITE
PAPER


6 IT SECURITY RISKS IN A PERIMETERLESS WORLD WHITE PAPER


5 TIPS FOR CHOOSING A NEXT-GENERATION FIREWALL WHITE PAPER


ARE WE READY FOR THE NEXT BIG BREACH? CASE STUDY


TOP 10 CONSIDERATIONS WHEN CHOOSING A MODERN SINGLE SIGN-ON SOLUTION WHITE PAPER


IDAAS BUYERS’ GUIDE WHITE PAPER


BLACKBERRY SECURES 96% OF THE ENTERPRISE IOT THREAT LANDSCAPE STORY


SPEAR PHISHING: TOP THREATS AND TRENDS (VOL 4) WHITE PAPER


SENSITIVE DATA PROTECTION IN THE RETAIL CARD PAYMENTS ECOSYSTEM WHITE PAPER


A COMPREHENSIVE GUIDE TO AUTHENTICATION TECHNOLOGIES AND METHODS WHITE PAPER


A COMPREHENSIVE GUIDE TO SECURING DATA WITH DATABASE ENCRYPTION WHITE PAPER


ENTERPRISE KEY MANAGEMENT SOLUTIONS WHITE PAPER


UPGRADING EXISTING SECURITY SYSTEMS TO BECOME AGILE QUANTUM-SAFE WHITE PAPER


PREPARING FOR WHAT’S NEXT: INNOVATION ALSO BRINGS CYBERSECURITY RISK STORY


2020 VULNERABILITY AND THREAT TRENDS-MID-YEAR UPDATE WHITE PAPER


THE GUIDE TO JUST-IN-TIME PRIVILEGED ACCESS MANAGEMENT WHITE PAPER


QUICK GUIDE- ENABLE & SECURE YOUR REMOTE WORKFORCE WHITE PAPER


EMAIL SECURITY THREAT REPORT 2020 CASE STUDY


CYBER AI FOR SAAS SECURITY: PROTECTING YOUR DYNAMIC WORKFORCE WHITE PAPER


SPEAR PHISHING: TOP THREATS AND TRENDS (VOL 3) WHITE PAPER


13 EMAIL THREAT TYPES TO KNOW ABOUT RIGHT NOW WHITE PAPER


MARKET ANALYSIS: CLOSING BACKUP AND RECOVERY GAPS WHITE PAPER


LEADING MALAYSIAN DEVELOPER ZEROES IN ON THREATS WITH LOGRHYTHM CASE STUDY


SECURE SD-WAN: THE LAUNCH PAD INTO CLOUD WHITE PAPER


THE NEW REALITY: BRINGING ORDER TO CHAOS WHITE PAPER


CLOUD TRENDS REPORT WHITE PAPER


2020 VULNERABILITY & THREAT TRENDS REPORT WHITE PAPER


LOGRHYTHM NAMED A LEADER IN 2020 GARTNER SIEM MAGIC QUADRANT CASE STUDY


THE LOGRHYTHM SECURITY OPERATIONS MATURITY MODEL WHITE PAPER


HOW SMES CAN QUICKLY AND COST-EFFECTIVELY DEPLOY DEFENSES AGAINST CYBERTHREATS
STORY


WORRY-FREE ENDPOINT PROTECTION FOR SMES STORY


HOW TO PROTECT YOUR BUSINESS IN THE DIGITAL ECONOMY STORY


GROUP-IB’S CYBERCRIMECON EVENT MAKES FULL-FLEDGED DEBUT IN SINGAPORE STORY

PreviousNext


RANSOMWARE ATTACKS & ENTERPRISE RESPONSE IN APAC

Jul 29, 2021


TRACK AN ATTACK ON CRITICAL INFRASTRUCTURE

Jun 28, 2021


NTT PROTECTS CUSTOMERS AND EMPLOYEES WITH CISCO UMBRELLA

Jun 14, 2021


4 KEY APPLICATION EXPERIENCE MONITORING TECHNOLOGIES YOU CANNOT IGNORE

Jun 14, 2021

PreviousNext
1234


INFOGRAPHICS


WIDESPREAD IMPACT OF RANSOMWARE IN ASIA PACIFIC

Feb 4, 2022

4 in 5 organizations in Asia Pacific affected by ransomware, with more than half
paying the ransom.


 * HACKERS INCREASINGLY TARGETING ZERO-DAY VULNERABILITIES, SUPPLY CHAIN
   NETWORKS FOR MAXIMUM IMPACT
   
   Feb 4, 2022


CYBER INTELLIGENCE

Latest


RANSOMWARE – A GROWING ENTERPRISE THREAT

By CrowdStrike | Sep 22, 2021

A deep dive into ransomware's evolution, why businesses can't afford to ignore
it, and what we can do about it.


 * GROUP-IB HELPED INTERPOL IN OPERATION LYREBIRD ARREST
   
   By CybersecAsia editors | Jul 13, 2021


 * A GUIDE TO AUTOMATING THREAT DETECTION WITH MITRE ATT&CK
   
   By LogRhythm | Jun 29, 2021


 * SECURING DIGITAL PAYMENTS GROWING TRICKIER FOR THE FINANCIAL SECTOR
   
   By CybersecAsia editors | Jun 28, 2021


CYBER WARFARE

Latest


SPY VS SPY: BATTLING THE UNSEEN GLOBAL PERSISTENT THREATS OF US-CHINA TENSIONS

By Carlo Cordova | Aug 30, 2021

Beneath the veneer of global APT attacks lies a complex crossfire of political
enmity, perfidy and cyber greed. Manchurian candidates, anyone?


 * UNDERSTANDING MYANMAR’S INTENSIFYING DIGITAL DISRUPTIONS
   
   By CybersecAsia editors | Apr 7, 2021


 * CYBER MURDER MYSTERY
   
   By Check Point Software Technologies | May 21, 2020


 * CYBER-DEFENDING OUR NATIONAL AIRSPACE
   
   By Victor Ng | Jan 15, 2020


MOST READ


THE FUTURE OF DIGITAL IDENTITIES AND DIGITAL TRUST



In the digital economy, businesses and individuals need digital trust – by
ensuring portable and verifiable digital identities and credentials, while
protecting privacy.


 * THREAT ACTORS ARE TEACHING OLD MALWARE NEW TRICKS
   
   


 * THE WORLD’S LARGEST EXPORTER OF IT WORKERS HAS A CYBER SKILLS SHORTAGE
   
   


 * IDENTITY SECURITY IN THE HYBRID WORK & CLOUD ERA
   
   


 * CYBERSECASIA READERS RECOGNIZE ASIA PACIFIC’S LEADERS IN CYBERSECURITY
   
   


 * “GOOD RAIN KNOWS THE BEST TIME TO FALL”: FRAUDSTER MOTTO
   
   


GARTNER’S MAGIC QUADRANT FOR APPLICATION SECURITY TESTING (AST)



Integrating application security into your software development process is
critical, but figuring out where to start can be confusing. Downloading
Gartner’s Magic Quadrant for Application Security Testing (AST) is a smart place
to start.


 * SECURING DATA WITH QUANTUM KEY DISTRIBUTION: A DEATH KNELL TO CYBER
   ATTACKERS?
   
   


 * VENDOR OF PRIVATE HEALTHCARE GROUP IN SINGAPORE SUFFERS DATA BREACH
   
   


 * RANSOMWARE: HOW YOUR DATA CAN BE YOUR BEST DEFENSE
   
   


 * THE FORRESTER WAVE Q3 IDAAS ENTERPRISE REPORT
   
   


 * HOW AN INSURANCE GIANT SECURES INNOVATION IN THE CLOUD
   
   



Search for:

GAMIFICATION LISTING

PARTICIPATE NOW





SPONSORS-RCA

BeyondTrust

Hillstone

Fortinet

Synopsys

Claroty

Kaspersky

Nexusguard

Nexusguard

Nexusguard

Nexusguard

Nexusguard

Nexusguard

Nexusguard

Nexusguard

Exabeam

Ivanti






POLLING



--------------------------------------------------------------------------------



 *     FEATURE:
   
   From Zero Trust to Zero Touch

   


 *     VIDEOS:
   
   The spark that unifies endpoint security management

   


 *     CASE STUDY:
   
   Government agency escapes a cyberattack while trialing an AI security
   solution


 * MORE...



WHITEPAPERS


 * HEALTHCARE AND PHARMACEUTICAL CYBER-THREAT 2021 REPORT
   
   Monday, January 24, 2022
   Healthcare and pharmaceutical cyber-threat 2021 report Specific cyber-threats
   in the healthcare and pharmaceutical sector to …Read More »


 * SELLING ENTERPRISE NETWORK ACCESS ON THE DARK WEB
   
   Monday, January 24, 2022
   Why and how cybercriminals compromise and sell enterprise network access
   detailsRead More »


 * WHAT BUSINESS LEADERS NEED TO KNOW ABOUT DATA LEAKAGE
   
   Monday, January 24, 2022
   Ransomware strikes fear to business leadersRead More »


 * APAC COMPANIES PRIORITIZE ‘ZERO TRUST’ NOW MORE THAN EVER
   
   Monday, January 10, 2022
   How Asian companies accelerate in prioritising zero trustRead More »

CASE STUDIES


 * GRACE IMPLEMENTS CHECK POINT SOLUTIONS FOR COMPREHENSIVE PROTECTION
   
   A leading manufacturing company uses Check Point solutions to simplify and
   secure data and business …Read more


 * INDONESIA’S LARGEST BANK TAPS ADVANCED NDR FOR TIGHTER CYBERSECURITY
   
   In addition to keeping pace with regional cyberattack trends and accelerated
   industry digitalization, the bank …Read more


 * HOW AN INSURANCE GIANT SECURES INNOVATION IN THE CLOUD
   
   An insurance company secures innovation using multi-cloudRead more


 * TMG SYDNEY UPLIFTS DATA SECURITY FOR THE SMB MARKET
   
   TMG Sydney protects client data of SMB businesses with affordable, reliable
   OneXafe SoloRead more




 * Home
 * About Us
 * Contact Us
 * Sitemap

 * Privacy & Cookies
 * Terms of Use
 * Advertising & Reprint Policy
 * Media Kit

 * Subscribe
 * Manage Subscriptions
 * Newsletter

Copyright © 2022 CybersecAsia All Rights Reserved.

 * 
 * 
 * 
 * 
 * 



Search for:




magic_popup_2

  Please correct the marked field(s) below.





  Thank you for signing Up