<
>

The Evolution of Ransomware – Navigating a New Age of Cybercrime

By: Sergey Shykevich, Threat Intelligence Group Manager at Check Point Software Technologies Ransomware is one of the single biggest threats to an organisation’s security. In the early days, attacks were conducted...

Four Ways to Simplify Multicloud Security in a Cloud Native World

Written by Sandeep Bhargava, Global Head of Solutions and Services, Rackspace Technology Multicloud security is a growing concern in the Asia Pacific region as businesses are increasing their spending on public...

Cyber Fraud Fusion Centres, Leveraging Network Effect Is Essential to Fight Fraud

By Gunnar Peterson, CISO, Forter   Fraudsters are inventive and meticulous in combing through the entire system to find weaknesses and gaps they can exploit in order to make illicit gains. Whether the insertion or...

Qualys March 2023 – Patch Tuesday

Bharat Jogi, Director, Vulnerability and Threat Research, Qualys Microsoft Patches for March 2023 Microsoft has addressed 101 vulnerabilities in the month of March, including 22 Microsoft Edge (Chromium-based)...

Questions To Ask Your Managed Security Services Provider

Attributed to Sandra Lee, Managing Director, Southeast Asia and Korea, Sophos Today’s threat landscape is too difficult, too complex, and changes too quickly for the vast majority of organizations to effectively...

Chinese Espionage Against Southeast Asian Nations Expands

Attributed to Eli Smadja, Research Group Manager at Check Point Software Check Point Research (CPR) sees the expansion of an ongoing cyber espionage campaign to target more Southeast Asian governments, including Vietnam,...

Take the Pressure off Coding for Your Developers

By: Steven Zimmerman, Product Marketing Manager, Synopsys Software Integrity Group In 2022, Synopsys commissioned the SANS Institute to examine how organisations achieved improvements in their security posture and...

Cyber Insurance Does Not Offset Ransomware Risks

Written by Dave Russell, Vice President of Enterprise Strategy, Veeam, and Rick Vanover, Senior Director of Product Strategy, Veeam Data protection against ransomware and cyberattacks is becoming increasingly critical....

Securing Open Source Development: A Supply Chain Perspective

By Igor Brandao, Senior Security Engineer, Red Hat Product security is the foundation of our software delivery at Red Hat. Developing open source is extraordinary, and we strive for the best standards since our code is open....

Delivering Secured Retail Experiences is a Matter of Trust

Attributed to: Budiman Tsjin, Solutions Engineering Manager for ASEAN, CyberArk The new year brings new challenges for the retail space, with organisations struggling to keep up with demand amid supply chain issues, shipping...