Is the world ready to be united against intensifying 2025 cyber warfare?
By Nadir Izrael, CTO, Armis | Nov 19, 2024
From AI-emboldened organized cybercriminals to state-sponsored quantum threats, the cyber landscape could run out of control unless we act now
Read MoreNo limit for number of blocked sites in Singapore
By Abhishek Kumar Singh, Head of Security Engineering, Singapore, Check Point Software Technologies | Nov 19, 2024
In a recent parliamentary session, Singapore's Ministry of Home Affairs (MHA) shared that it will not set a threshold for the number of websites blocked. This is after the country...
Read MoreIgnoring deepfakes – a risky gamble for CXOs
By James Nunn-Price, Senior Managing Director (APAC Security), Accenture | Nov 12, 2024
Deepfakes present a clear and present danger, and their societal risk is well accepted. Across the world, deterrence measures are being put in place
Read MoreProtecting the region’s critical infrastructure from high-stakes cyber threats
By Dave Russell, Vice President, Enterprise Strategy, Veeam | Nov 8, 2024
With AI-powered threats and state-sponsored cyber-warfare rife in the digital age, what mindset change is needed in critical infrastructure industries?
Read MorePreventing ransomware with EDR and NDR: a complementary approach
By Daniel Chu, Vice President (Systems Engineering), ExtraHop APJ | Oct 17, 2024
Neither EDR and NDR are complete solutions in themselves — but when combined, this writer believes a more viable defense is achievable
Read MoreWhat are the missing elements in supply chain cybersecurity and resilience?
By Chuan Wei Hoo, Chief Information Security Officer, StarHub | Oct 11, 2024
This CISO cites five factors that leaders may be too embarrassed or denialistic to address when tackling a global problem…
Read MoreProtecting enterprise data is no longer a business option
By Stephen McNulty, Senior Vice-President, OpenText Asia-Pacific | Oct 3, 2024
COVID-19 forever changed the digital landscape and its cybersecurity perimeters. However, some governments and businesses are lagging behind in data protection
Read More“Bump in the night”: What’s next?
By CybersecAsia editors | Sep 26, 2024
The conversation has now shifted to what’s next, as cybersecurity risk is more prominent than ever in the wake of the CrowdStrike...
Read MoreWhich came first? Surges in data center AI adoption, or skyrocketing global AI adoption?
By Leonardo Hutabarat, Head, Solutions Engineering (APJ), Exabeam | Sep 20, 2024
The world seems hell-bent on monetizing its own self-created AI hype, and threat actors are hell-bent on exploiting this
Read MoreEmpowering youth responsibly is the key to an AI-centric sustainable future
By Teong Eng Guan, Regional Director, Southeast Asia and Korea, Check Point Software Technologies | Sep 2, 2024
How we educate and groom digital natives for responsible innovation and social/ecological answerability will tap their potential for greatness (or folly)
Read MoreVoters-draw/RCA-Sponsors
CybersecAsia Voting Placement
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
Whitepapers
Data Management in the Age of Cloud and AI
In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download WhitepaperMitigating Ransomware Risks with GRC Automation
In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper2024 Gartner® Magic Quadrant™ for SD-WAN
Gartner® has positioned Fortinet highest for Ability to Execute for the fourth year in a …Download Whitepaper5 Cybersecurity Dashboards for CISOs
Are you ready to transform your cybersecurity approach? With Commugen's 5 Cybersecurity Dashboards for CIOs, …Download Whitepaper
Middle-sidebar-banner
Case Studies
Data Management in the Age of Cloud and AI
In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Read moreUnlock Your Guide to Securing Business Critical Secrets
Is your organization effectively managing access to sensitive secrets like credentials, API keys, and certificates …Read moreRBL Finserve boosts control of growing number of identities in its multi-cloud environment
By adopting a third-party identity security platform, the Indian financial institution expects to leverage zero …Read moreMAX Solutions safeguards data for digital transformation with Veeam
One of the largest employment providers in Australia needed to protect data while reducing complexity …Read more