Is your organization compliance-ready for the third stage of PCI DSS 4.0?
By Reinhart Hansen, Director of Technology, Office of the CTO, Imperva | May 7, 2024
With this final stage of PCI DSS 4.0 taking effect next year, organizations need to act now to prepare for compliance
Read MoreSix benefits of cloud-centric secrets management
With the burden of secrets management squarely fallen on developers, it is time to centralize and streamline this cyber resilience process
Read MoreHow to strengthen your first line of cyber defense: Passwords
By Jess Ng, Country Head (Singapore and Brunei), Fortinet | May 3, 2024
Here is a refresher for readers who are still stuck with password protected systems amid increasingly sophisticated credential-theft techniques
Read MoreDoes using the fear factor encourage people to be more cyber vigilant?
By CybersecAsia editors | Apr 22, 2024
Is it better to use inclusiveness and positive reinforcement when educating the young about the need to be cyber vigilant?
Read MoreTempted by cross-platform development? Know the pitfalls!
Despite the many advantages of “building apps for any screen”, the security risks of current bridge plugins are a veritable minefield
Read MoreAligning network and security teams with SASE and Zero Trust
By Nick Harders, SASE Director (APJ), HPE Aruba Networking | Apr 2, 2024
SASE is a security model, while Zero Trust is a security framework. Can the two solutions help unify networking/security teams?
Read MoreShadowy IT activities by remote workers can ruin cybersecurity
By Scott Hesford, Director of Solutions Engineering (APJ), BeyondTrust | Apr 1, 2024
Yet, abruptly stopping such workers in their tracks can be equally risky. Find out the right approach to plugging the threats…
Read MoreFive tips to integrate DevSecOps holistically
By Nick Liffen, Director, Advanced Security, GitHub | Mar 30, 2024
Through the following tips, organizations will not only boost DevSecOps efficiency, but reap benefits exceeding the sum of the IT parts
Read MoreAre your data disaster backup/recovery strategies up to the mark in 2024?
By L L Seow | Mar 27, 2024
Here are up-to-date checklists and ideas from three data management vendors to compare against your own organizations’ possibly inadequate playbooks
Read MoreTreat cybersecurity investments as you would grow your savings
The trick is to focus on self-running, tried-and-tested ways to secure assets and increase their value regularly — like building passive income
Read MoreVoters-draw/RCA-Sponsors
CybersecAsia Voting Placement
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
Whitepapers
Securing Industry 4.0
The world is advancing to Industry 4.0 in full swing, and this is a key …Download WhitepaperSecure Access Service Edge (SASE) Solutions for Today’s Work-From-Anywhere (WFA) Environment
Organizations are turning to Secure Access Service Edge (SASE) solutions for securing remote work environments, …Download WhitepaperIdentity Has Breached the Ecosystem
This whitepaper explores the dual nature of identity in cybersecurity, emphasizing its role in both …Download WhitepaperFortanix Buyers Guide for Modern Key Management and Data Security
This document underscores the pressing challenges in key management and data securityDownload Whitepaper
Middle-sidebar-banner
Case Studies
How medical devices manufacturer Tuttnauer protects patient and personal-data safety
In running a cloud-based portal to link its smart medical equipment, the firm has also …Read moreAI vulnerability testing: Knowing the In’s and Out’s of proper red teaming
To test the safety/security of a generative AI feature, what unchartered bugs and human testing …Read moreReal estate logistics provider GLP steps up to zero trust architecture
With its physical and digital footprint growing, the global firm’s outdated legacy security stack has …Read moreIdentity security woes now a thing of the past for Heng Leong Hang
The retail chain was grappling with numerous cyber risks in its IT infrastructure until it …Read more