<
>
Home » News » Daily News
Multiple Vulnerabilities in Google Android OS Could Allow for Arbitrary Code Execution

OVERVIEW: Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code...

Can We Remove the Human Element In Cybersecurity? Expert Panel Discusses at CSA Roundtable Event

The C-level cybersecurity roundtable organised by CSA together with IBM and CyberSecurity Malaysia last week, attended by Malaysian business decision makers...

Dell Technologies rolls out the 10th Generation of Latitude laptops

Twenty-five years ago, Dell introduced the Latitude laptop series into the market. Over the years, different versions of the Latitude have been released,...

Moving Towards a Cashless Payment Environment

As technology continues to innovate the world, the payment industry is seeing changes as well. Cashless payment methods are now becoming the preferred method...

Clash Between Legacy Approaches and New Technologies to Ignite Severe Security Issues for Underprepared Organisations

CSA’s own coverage has seen us publish a number of studies, reports and expert opinions that highlight how widespread, dangerous and persistent the cyber...

China leads the world in Digital Payments

China, the world’s first country to use paper money, may soon become the world’s first country to not have paper money in the future. As...

Visa Unveils Future of Security Roadmap for Payment Security

During the recent Visa Security Summit in Shanghai, China, Visa unveiled its security roadmap for the Asia Pacific region. The roadmap outlines a robust...

Visa leveraging on blockchain

Blockchain in cybersecurity continues to be a topic many companies are looking into. With blockchain being the most transparent method and with its...

CyberSecurity Asean security alert on A Vulnerability in Exim Could Allow for Remote Command Execution

This alert is originally published and can be viewed at https://www.cisecurity.org OVERVIEW: A vulnerability has been discovered in Exim, which...

Why Businesses Need to Implement the Cyber Resilience Lifecycle

As organisations continue to invest in cybersecurity protection, many still do not have a proper cyber resilience strategy. Besides the lack of awareness, one...

Pages