American spy agency NSA teaches the public about smartphone security
The basic tips are probably just the tip of the agency’s cyber-warfare-arsenal iceberg, but state-sponsored actors are equal-opportunity champions too
Read MoreSelect Page
By CybersecAsia editors | Monday, June 10, 2024, 10:27 AM Asia/Singapore | News, Newsletter
The basic tips are probably just the tip of the agency’s cyber-warfare-arsenal iceberg, but state-sponsored actors are equal-opportunity champions too
Read MoreBy Jonathon Dixon, Vice President and Managing Director (APJC), Cloudflare | Monday, October 30, 2023, 8:30 AM Asia/Singapore | Newsletter, Tips
No matter how tough the cybercriminals get, these five basic cybersecurity strategies must keep the hospital staff, administration and operations resilient.
Read MoreBy CybersecAsia editors | Wednesday, August 16, 2023, 9:25 AM Asia/Singapore | Most Read2, News, Newsletter
Attackers can intercept connector credentials via MITM attacks, or hack the Password Hash Sync process, thereby extracting domain users’ NT hashes
Read MoreBy CybersecAsia editors and webmaster webmaster | Friday, September 9, 2022, 12:25 PM Asia/Singapore | News, Newsletter
Coupled with previous US shows of distrust against China-owned digital giants, this latest (possible) breach could be used for political mileage
Read MoreBy CybersecAsia editors and webmaster webmaster | Thursday, September 23, 2021, 2:05 PM Asia/Singapore | News, Newsletter
The Cring ransomware group will be happy to infiltrate your network and hold your data hostage!
Read MoreBy L L Seow | Monday, April 12, 2021, 2:13 PM Asia/Singapore | Newsletter, Tips
When hackers feel heckled by cyber defenders, they scrape even ‘old’ data to wreak revenge. Protect yourself with these safety tips …
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, November 24, 2020, 3:36 PM Asia/Singapore | News, Newsletter
With increasing migrations to cloud platforms due to DX, one recent study has discerned a lag in data management and protection.
Read MoreBy CybersecAsia editors and webmaster webmaster | Friday, October 2, 2020, 2:29 PM Asia/Singapore | News, Newsletter
Furthermore, network segmentation and zero-trust policies are not widely implemented to address this gaping attack surface.
Read MoreBy Victor Ng | Friday, September 4, 2020, 11:45 AM Asia/Singapore | Data Protection, Features, Newsletter, Tips
The need for organizations to deploy modern processes to secure and manage their data is more critical now than ever.
Data continues to grow at exponential rates. At the same time, the largescale work-from-home (WFH) arrangements – and employees accessing the company network from their own devices – has increased the surface area for cybersecurity attacks.
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, August 11, 2020, 9:40 AM Asia/Singapore | News, Newsletter
Some legacy industrial robotics programming platforms contain vulnerable open source code that...
Read MoreBy Stephen Scharf, Chief Security Officer, DTCC and webmaster webmaster | Thursday, May 21, 2020, 11:49 AM Asia/Singapore | Newsletter, Opinions
No, not digital linear tape, but distributed ledger technology! The technology behind distributed...
Read MoreBy Teck Wee Lim, Regional Director ASEAN, CyberArk and webmaster webmaster | Tuesday, January 28, 2020, 12:19 PM Asia/Singapore | Opinions, Website Protection
The trade-off of convenience versus security will help answer the question, but password...
Read MoreBy Rich Murr, Chief Information Officer, Epicor Software and webmaster webmaster | Monday, January 13, 2020, 12:04 PM Asia/Singapore | Opinions
When you sieve out the data security techno jargon and vendor hyperbole, only a few key goals get...
Read MoreBy webmaster webmaster | Tuesday, November 12, 2019, 4:27 PM Asia/Singapore | Features, Network Security
Intelligent automation and predictive analytics will be integral to all security frameworks in...
Read MoreBy L L Seow | Thursday, November 7, 2019, 2:40 PM Asia/Singapore | Features, Risk Management, Security Awareness & Education
With more hackers stealing password hashes from single sign-on terminals, it is time to employ...
Read More
PARTICIPATE NOW |
|