More business-process attacks, device-based attacks and identity-based deepfake attacks are headed our way, predicts a specialist firm This year, phishing kits will get trickier. Phishing continues to ...
For the new year, here are some more trends and predictions from cybersecurity experts across Asia Pacific. Since December 2024, we have been featuring cybersecurity trends and predictions from Asia ...
Based on market analysis, interviews with industry experts and industry report reviews, a web hosting firm has released a report suggesting that domain names have transformed into strategic assets ...
Listen in as two experts discuss how CISOs and cybersecurity teams can better articulate the needs and challenges of modernizing SOCs today. Your Splunk environment is critical for data management and ...
Beefing up the cyber workforce; helping vulnerable SMEs; establishing cyber intelligence networks through public-private-partnerships; and assimilating international cyber trends are key As the ...
The 2nd CybersecAsia Awards honors Asia Pacific’s leaders in cybersecurity for the critical roles played and the huge advances and innovations made over the last two years. With the onslaught of COVID ...
A recent vulnerability in the MAC layer protocols in wireless networks has opened a Pandora’s Box for further intensive 5G research A recent vulnerability called SPARROW (CVD-2021-0045) has been ...
Find out how organizations can leverage transformative technologies such as AI, machine learning while mitigating cyber risks. The operational technology (OT) landscape is rapidly evolving with the ...
The increasingly complex and aggressive threat landscape in Asia Pacific calls for an integrated approach to resiliency, especially when critical infrastructure is targeted leveraging machine and ...
Going back to ZTA basics, we are reminded of three core strategies revolving around identity and privileged access management. As more workforces become augmented by non-human entities such as ...