Does using the fear factor encourage people to be more cyber vigilant?
By CybersecAsia editors | Apr 22, 2024
Is it better to use inclusiveness and positive reinforcement when educating the young about the need to be cyber vigilant?
Read MoreTempted by cross-platform development? Know the pitfalls!
Despite the many advantages of “building apps for any screen”, the security risks of current bridge plugins are a veritable minefield
Read MoreAligning network and security teams with SASE and Zero Trust
By Nick Harders, SASE Director (APJ), HPE Aruba Networking | Apr 2, 2024
SASE is a security model, while Zero Trust is a security framework. Can the two solutions help unify networking/security teams?
Read MoreShadowy IT activities by remote workers can ruin cybersecurity
By Scott Hesford, Director of Solutions Engineering (APJ), BeyondTrust | Apr 1, 2024
Yet, abruptly stopping such workers in their tracks can be equally risky. Find out the right approach to plugging the threats…
Read MoreFive tips to integrate DevSecOps holistically
By Nick Liffen, Director, Advanced Security, GitHub | Mar 30, 2024
Through the following tips, organizations will not only boost DevSecOps efficiency, but reap benefits exceeding the sum of the IT parts
Read MoreAre your data disaster backup/recovery strategies up to the mark in 2024?
By L L Seow | Mar 27, 2024
Here are up-to-date checklists and ideas from three data management vendors to compare against your own organizations’ possibly inadequate playbooks
Read MoreTreat cybersecurity investments as you would grow your savings
The trick is to focus on self-running, tried-and-tested ways to secure assets and increase their value regularly — like building passive income
Read MoreThree critical data management strategies to observe minute-by-minute
By Andy Ng, Vice President and Managing Director, Asia South and Pacific Region, Veritas Technologies | Mar 20, 2024
The following strategies do not work only on World Backup Day, but may save your organization if enshrined into corporate culture
Read MoreSprucing up cyber resilience in the financial services industry: four focal points
By Jason Harrell, Managing Director and Head of External Engagement, DTCC | Mar 19, 2024
How can the highly-targeted financial services industry remain operational and resilience in a year of escalating state-sponsored threats and cyberattacks?
Read MoreCan software developers trust automated code generation?
By CybersecAsia editors | Mar 13, 2024
As generative AI liberates more senior software developers from routing coding tasks, many other elements of this automation need consideration
Read MoreVoters-draw/RCA-Sponsors
CybersecAsia Voting Placement
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
Whitepapers
Secure Access Service Edge (SASE) Solutions for Today’s Work-From-Anywhere (WFA) Environment
Organizations are turning to Secure Access Service Edge (SASE) solutions for securing remote work environments, …Download WhitepaperIdentity Has Breached the Ecosystem
This whitepaper explores the dual nature of identity in cybersecurity, emphasizing its role in both …Download WhitepaperFortanix Buyers Guide for Modern Key Management and Data Security
This document underscores the pressing challenges in key management and data securityDownload WhitepaperFortanix Data Risk Management – Using Tokenization to Secure Your Data
In today's digital world, organizations prioritize data security. To protect sensitive information, they use tokenization, …Download Whitepaper
Middle-sidebar-banner
Case Studies
How medical devices manufacturer Tuttnauer protects patient and personal-data safety
In running a cloud-based portal to link its smart medical equipment, the firm has also …Read moreAI vulnerability testing: Knowing the In’s and Out’s of proper red teaming
To test the safety/security of a generative AI feature, what unchartered bugs and human testing …Read moreReal estate logistics provider GLP steps up to zero trust architecture
With its physical and digital footprint growing, the global firm’s outdated legacy security stack has …Read moreIdentity security woes now a thing of the past for Heng Leong Hang
The retail chain was grappling with numerous cyber risks in its IT infrastructure until it …Read more