Making sense of the EU AI Act of August 2024
By Hitesh Sheth, CEO, Vectra AI | Aug 19, 2024
Need help in planning next year’s security and ris...
By CybersecAsia editors | Aug 14, 2024
Lessons learned from the unintended ‘largest IT ou...
By L L Seow | Aug 13, 2024
How critical IT-OT security issues can threaten Asia’s race to reindustrialization
By Jay Gomez, Field CISO/Advisor & Consultant, Telstra International | Sep 6, 2024
Here are four core principles that need strengthening to ensure that IT-OT convergence gaps do not lead to major cyber incidents
Read MoreHas your digital device been crypto-jacked? Know the signs and precautions
By Eric Roshaan, Enterprise Analyst, ManageEngine | Sep 4, 2024
Fraudsters and even state-sponsored threat actors are constantly trying to hijack compute resources secretly, for their illicit cryptocurrency mining activities
Read MoreNavigating Emerging Technologies in Operational Technology
By Dr. Lim Woo Lip, Chief Technology Officer ST Engineering, Cyber BA | Sep 2, 2024
Learn how organizations can strike a balance between leveraging emerging technologies and mitigating risks with OT cybersecurity.
Read MoreMaking sense of the EU AI Act of August 2024
By Hitesh Sheth, CEO, Vectra AI | Aug 19, 2024
It may be the first comprehensive legislation over responsible AI development, but the unpredictability and diversity of this aspect raises questions...
Read MoreNeed help in planning next year’s security and risk management spending?
By CybersecAsia editors | Aug 14, 2024
A market research and consulting firm has produced a guide to help you...
Read MoreLessons learned from the unintended ‘largest IT outage’ ever
By L L Seow | Aug 13, 2024
As malicious threat actors learn from the recent outage to craft much-more-serious attacks to unleash on the world, take action NOW!
Read MoreAI is causing identity management crises, and it is also the cure
By Eric Kong, Managing Director (ASEAN), SailPoint | Aug 13, 2024
Find out why and how businesses can tap intelligent automation and deep learning to manage the expanding attack corporate perimeter
Read MoreDon’t let Olympic-linked cyber threats filter through your organization!
Here are some reminders to CISOs about the major threats involved with the global event, and how to protect your workplace
Read MoreUsing AI to grow your investments and speculative bets? Read this!
By Contributors, Check Point Research | Aug 6, 2024
The risks and potential damages from cyberattacks and “unforseen” tech outages and bugs in the algorithms need to be clearly understood
Read MoreSilicon masks and biometric authentication – a threat to security?
By Darren Guccione, CEO and Co-Founder, Keeper Security | Aug 6, 2024
Can hyper-realistic silicon masks beat facial recognition biometric authentication systems? Maybe passwords are still useful...
Read MoreVoters-draw/RCA-Sponsors
CybersecAsia Voting Placement
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
Whitepapers
Discover the Top Vendor in the SecureIQ CyberRisk Validation Report
F5 Distributed Cloud Web App and API Protection (WAAP) outperforms the competition in SecureIQ Lab's …Download Whitepaper2024 Voice of the CISO
The "2024 Voice of the CISO" report by Proofpoint offers insights from a survey of …Download WhitepaperSecuring Industry 4.0
The world is advancing to Industry 4.0 in full swing, and this is a key …Download WhitepaperTo the Power of Proofpoint
Microsoft 365 is indispensable for modern businesses, facilitating remote work, global collaboration, and cloud operations.Download Whitepaper
Middle-sidebar-banner
Case Studies
Adding secure automatic multi-factor authentication boosts customer experience: Tiger Brokers
Can tightening identity security degrade customer experience? In this case study, an online trading platform …Read moreGFG takes cloud attack surfaces seriously with exposure management platform
Entrusted with the personal data of 800m customers worldwide, the fashion group takes no chances …Read moreBrunei’s Baiduri Bank leverages cloud authentication platform for corporate and consumer divisions
Integrating authentication across the group is helping to improve customer centricity while boosting scalability and …Read moreAdopting a security identity platform boosts cybersecurity efficiency at Fareportal
With remote-working arrangements adding complexity to its global privilege access management, the firm went for …Read more