<
>

Embedding Cybersecurity into Digital Transformation

Authored by: Wong Joon Hoong, Country Manager, Sophos Malaysia   The adoption of digital transformation in Malaysia accelerated dramatically in 2020 due to the Covid-19 pandemic but we still have a long journey ahead of...

Don’t Be The Weak Link in Your Customers’ Supply Chain Security

Authored by: Taylor Armerding, Security Advocate, at Synopsys Software Integrity Group   Nobody wants to be known as the weak link in the chain — any chain. But too many organisations are at risk of being just that...

Double Trouble – the Threat of Double Extortion Ransomware and How Your Organisation Can Protect Itself

By Sharat Sinha, Vice President/ General Manager, APAC at Check Point Software Technologies   By the time you have finished reading this sentence, an organisation somewhere in the world would have fallen victim to a...

Modern Bank Heists: Financial Institutions Are Being Held Hostage

By Tom Kellermann, Head of Cybersecurity Strategy, VMware Security Business Unit, @TAKellermann   The modern bank heist has escalated to a hostage situation over the past year. The new goal of attackers is now to hijack...

How to Enhance Your Fraud Risk Management Programme in a Changing Landscape

Authored by Helen Langton, CEO, APAC and Middle East, International Compliance Association   Crises rarely announce themselves in advance, and the COVID-19 pandemic is no exception. It has been the great disruptor of the...

How Threat Actors Abuse ICS-Specific File Types

Authored by: Nadav Erez, Director of Innovation at Claroty   The information technology (IT) security community is well educated on the risks of cyber threats, with precautions such as anti-virus systems, dedicated...

Authentication: Part of Business Continuity

Authored by: Andrew Shikiar, Chief Marketing Officer and Executive Director of FIDO Alliance Less than half of the companies in Southeast Asia involve cybersecurity functions at the planning stage of a new business...

NetSecOPEN Drives New Test Standards for the Ever-Evolving Network Security Landscape

Authored by: Sashi Jeyaretnam, Network Apps & Security, Keysight Technologies The Internet is continuously going through rapid changes that are driving the need to evolve testing standards faster than...

Cybersecurity Isn’t Cybersecure Without Detection and Recovery

Authored by: Sheena Chin, Managing Director of ASEAN, Cohesity Anyone responsible for data security who doesn’t get a shiver down their spine when they read in the news about yet another high-profile ransomware attack...

Four Ways to Protect Against Supply Chain Infiltration

Authored by: Teck Wee Lim, Regional Director, ASEAN at CyberArk Businesses have learned how to be cyber-resilient since the pandemic hit. Those who have successfully introduced innovative offerings and business models...