Do ransomware attacks cripple the confidence of the IT teams affected?
One study may be the first to even touch on the psycho-social impact of ransomware attacks on cyber defenders.
Read More
Select Page
By CybersecAsia editors and webmaster webmaster | Thursday, October 22, 2020, 3:50 PM Asia/Singapore | News, Newsletter
One study may be the first to even touch on the psycho-social impact of ransomware attacks on cyber defenders.
Read MoreBy L L Seow | Thursday, October 15, 2020, 2:22 PM Asia/Singapore | Features, Newsletter
In a battle of wits and speed, pentest attackers can triumph over human defenders unless an AI nemesis is the gatekeeper …
Read MoreBy CybersecAsia editors and webmaster webmaster | Wednesday, October 14, 2020, 5:28 PM Asia/Singapore | News, Newsletter
If you know the enemy and know cyber defenses, you need not fear the result of a hundred cyberattacks.
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, October 6, 2020, 2:34 PM Asia/Singapore | News, Newsletter
Cybercriminals are enjoying their own game: preying on gamers and exploiting any lax security by gaming platforms.
Read MoreBy Carlo Cordova and webmaster webmaster | Monday, September 28, 2020, 10:26 AM Asia/Singapore | Features, Newsletter
Students in some countries are gradually returning to some level of classroom learning, only to find that cyberthreats have escalated.
Read MoreBy Tom Kellermann, Head Cybersecurity Strategist, VMware Carbon Black | Friday, September 25, 2020, 11:32 AM Asia/Singapore | Newsletter, Opinions
Amidst the pandemic, the sector has experienced more cyberattacks than any other. Time to buckle up, says this expert.
Read MoreBy Brad Gray, Senior Vice President (APAC), Exclusive Networks | Friday, September 25, 2020, 11:24 AM Asia/Singapore | Newsletter, Opinions
AI-powered cyberattacks, crypto cloud mining and manipulated data are just some of the methods that cybercriminals will use against us .
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, September 15, 2020, 12:40 PM Asia/Singapore | Newsletter, Tips
When no organizations are impervious to cyberattacks, backup immutability should be part of every business’ defense strategy. Find out more here…
Read MoreBy Nick Itta, Vice President, APAC, EfficientIP | Wednesday, August 26, 2020, 1:46 PM Asia/Singapore | Newsletter, Opinions
The down-time and massive disruptions caused by phishing and malware are jeopardizing the world’s manufacturing industries, says this zero-trust proponent.
The Industry 4.0 era has provided manufacturers with the digital capabilities to make industrial manufacturing and the management of local, regional and global supply chains more efficient and sustainable.
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, August 11, 2020, 10:24 AM Asia/Singapore | News
Meanwhile, cyber defence teams with limited resources are struggling to cope, according to the...
Read MoreBy L L Seow | Wednesday, July 22, 2020, 10:29 AM Asia/Singapore | Features, Newsletter
We need to look at the talent crunch through a human-centric lens and take in non-traditional...
Read MoreBy webmaster webmaster | Wednesday, July 8, 2020, 12:08 PM Asia/Singapore | News, Newsletter
Escalating demands for cyber-incident response and investigations amidst the pandemic require...
Read MoreBy webmaster webmaster | Wednesday, June 24, 2020, 2:14 PM Asia/Singapore | News, Newsletter
Freebies for Minecraft and The Witcher were used to lure WFH gamers into phishing sites and hidden...
Read MoreBy L L Seow | Monday, June 22, 2020, 8:59 PM Asia/Singapore | Features, Newsletter
A recent global threat report has piqued curiosity around how threat actors prioritize attack...
Read MoreBy McAfee | Friday, May 29, 2020, 6:04 PM Asia/Singapore | Cloud Security, Whitepapers
New study shows a significant increase in cyberattacks targeting cloud services as employees largely work from home.
Based on data from more than 30 million McAfee MVISION Cloud users worldwide between January and April 2020, this report reveals significant trends that include the rise of cloud-native threats, access from unmanaged devices, and an increase in the use of cloud services.
Read More|
PARTICIPATE NOW |
|
|




