<
>

Posts in Cyber Safety

Turnkey Cloud Solution for ASEAN markets

Hitachi Sunway is bundling the ZeroStack Intelligent Cloud platform on any x86 servers to offer a turnkey, secure private cloud solution for demanding customers in ASEAN markets. ZeroStack are...

CyberSecurity Asean security alert on A Vulnerability in Microsoft Internet Explorer Could Allow for Arbitrary Code Execution

This alert is originally published and can be viewed at www.cisecurity.org OVERVIEW: A vulnerability has been discovered in Microsoft Internet Explorer, which could allow for arbitrary code...

Game Over for Gaming Security?

McAfee released results from its survey, Game Over: The Future of Gaming Security, finding that while gamers profess to exhibit good cybersecurity habits there’s still work to do. The...

Is your organisation at risk to a cyberattack?

Authored by: Jerry Tng, Vice President APAC, Ivanti Data privacy is commonly linked with users’ awareness of data hazards, yet it is also important to be aware of the importance of...

Vietnam's draconian cybersecurity bill comes into effect

A law requiring Internet companies in Vietnam to remove content communist authorities deem to be against the state came into effect Tuesday (Jan 1), in a move critics called "a totalitarian...

Singapore Government to Launch Second Bug Bounty Initiative

HackerOne, the leading hacker-powered security platform, will partner with the Government Technology Agency of Singapore (GovTech) and the Cyber Security Agency of Singapore (CSA), to work with local...

Threat Graphs: The Old World Statistics Model as a Weapon Against New World Cyber Security Issues

Graph databases are not new. They have been around since the 1960s and work on the basis of storing independent objects and adding dependencies between them. They are not rigid and can adapt as...

Cybersecurity Asean Executive Briefing Note to Securing The Interconnected World

In today’s business environment, enterprises are becoming more digital, global and interconnected. The proliferation of technology trends such as mobile devices, BYOD, Internet of Things (IoT),...

You Got Breached. Now What? Are You Secure in Your Security Strategy?

  Two painful truths about today’s modern cyber threat. One is that no one can guarantee they can prevent 100% of all attacks from being successful. Second is that when Malware gets...

Staying Resilient In The Face of Agile Cyber Attacks: CSA Interviews McAfee CTO for APAC

In light of the recently released McAfee Labs 2019 Threats Predictions Report, which went in depth into how the threat landscape will look like in the coming year, CSA was able to get in touch with...

Pages

Subscribe to RSS - Cyber Safety