Experts weigh in on Singapore’s response to UNC3886
By CybersecAsia editors | Aug 8, 2025
Just days away from its 60th National Day celebrations, Singapore raised its cyberthreat alert level. Cybersecurity experts share their perspectives with CybersecAsia.
Read MoreProactive security to sustain energy and AI
Power and cooling for data centers handling the huge upsurge of demand from AI adoption are being targeted – and the world’s energy grids are in danger.
Read MoreOpen-source AI democratization: Can cyber defenses rise to the double-edged challenges?
When accessibility barriers fall, vulnerabilities emerge. Open-source AI models can be exploited by more people: a double-edged sword in the making
Read MoreShadow AI: Open source GenAI’s hidden threats to enterprise security
By By David Sajoto, Vice President and General Manager (Asia-Pacific and Japan), Mimecast | Apr 4, 2025
Open source generative AI tools, when not managed well, amplify security risks through shadow IT, putting sensitive data and systems at risk
Read MoreGlobal AI race must balance innovation, security, and ethical governance challenges
The world must avoid the “gold rush” mentality that clouds stakeholders from ethical and sustainability concerns that demand responsibility and accountability
Read MoreFighting AI with AI in the Cloud: The key is a holistic approach
As a double-edged sword, AI requires numerous critical ingredients in place before it can fulfill its positive potential. Find out why.
Read MoreSecuring AI-generated code: Lessons from Open Source’s early challenges
By Fred Bals, Senior Security Researcher, Black Duck | Jan 9, 2025
In drawing parallels in the two software development methods, this author offers tips on strengthening DevSecOps in the age of AI
Read MoreIs the world ready to be united against intensifying 2025 cyber warfare?
By Nadir Izrael, CTO, Armis | Nov 19, 2024
From AI-emboldened organized cybercriminals to state-sponsored quantum threats, the cyber landscape could run out of control unless we act now
Read MoreNo limit for number of blocked sites in Singapore
By Abhishek Kumar Singh, Head of Security Engineering, Singapore, Check Point Software Technologies | Nov 19, 2024
In a recent parliamentary session, Singapore's Ministry of Home Affairs (MHA) shared that it will not set a threshold for the number of websites blocked. This is after the country...
Read MoreIgnoring deepfakes – a risky gamble for CXOs
By James Nunn-Price, Senior Managing Director (APAC Security), Accenture | Nov 12, 2024
Deepfakes present a clear and present danger, and their societal risk is well accepted. Across the world, deterrence measures are being put in place
Read More
Voters-draw/RCA-Sponsors
CybersecAsia Voting Placement
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
Whitepapers
2024 Insider Threat Report: Trends, Challenges, and Solutions
Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download WhitepaperAI-Powered Cyber Ops: Redefining Cloud Security for 2025
The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download WhitepaperData Management in the Age of Cloud and AI
In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download WhitepaperMitigating Ransomware Risks with GRC Automation
In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper
Middle-sidebar-banner
Case Studies
PT Kereta Api Indonesia announces nationwide email and communication overhaul
The state railway operator’s upgraded email system improves privacy, operational reliability, and regulatory alignment for …Read moreOperationalizing sustainability in cybersecurity: Group-IB’s approach
See how the firm turned malware-group takedowns into measurements of sustainability and resilience gains: by …Read moreThai government expands secure email management to close cybersecurity gaps
New measures address cybersecurity gaps in public sector communications, deploying advanced protections and operational support …Read moreHow Iress optimized global DevSecOps
Scaling compliance, security & efficiency – while seamlessly migrating to the cloud – with JFrog.Read more