The 5th CybersecAsia Readers’ Choice Awards honors Asia Pacific’s leaders in cybersecurity for the critical roles played and the huge advances and innovations made over the last two years. SINGAPORE, ...
Staff layoffs and business downsizing exercises may hurt cybersecurity more than expected. Here’s one expert’s recommendations for tightening vigilance. As the world is faced with unprecedented change ...
In a fast-evolving threat and technology landscape, cybersecurity together with digital transformation has become a top-of-mind issue at the Board and C-suite levels for organizations across all ...
Work-from-home and social media dominate Q4 2020 email scams. In the fourth quarter of 2020, real phishing emails that were reported to IT departments related to working from home are on the rise.
F5 Distributed Cloud Web App and API Protection (WAAP) outperforms the competition in SecureIQ Lab’s latest report. Tested alongside 12 leading enterprise-class WAAP solutions, F5 achieved exceptional ...
Find out how organizations can leverage transformative technologies such as AI, machine learning while mitigating cyber risks. The operational technology (OT) landscape is rapidly evolving with the ...
As hybrid- and remote-working arrangements continue to be enforced, many enterprises have adopted Bring Your Own Device (BYOD) policies that have led to a mixing of corporate and personal data on a ...
Trust and security: As digital banks have no physical branches, the mobile application becomes the sole touchpoint for users.Ensuring security and building trust in this digital-only environment is ...
In an era of digital disruptions in the form of digital transformation, generative AI, data breaches, ransomware and sustainability, what should organizations be looking out for? With digitalization ...
If 2020 statistics are an indication, 2021 is set to see a proliferation of BGH, ransomware and supply chain espionage. CrowdStrike has recently released its 2021 Global Threat Report, which shows ...
A recent vulnerability in the MAC layer protocols in wireless networks has opened a Pandora’s Box for further intensive 5G research A recent vulnerability called SPARROW (CVD-2021-0045) has been ...
Many organizations use virtual private networks (VPNs), putting business data, intellectual property, applications, and systems at high-security risks every time a user or device is trusted in this ...