<
>

Securing the Journey to Cloud

In this e-book, we have compiled all the security considerations that you should take...

January 2020 Special Focus - What Lies Beneath the...

The web is accessed by billions of people around the globe. There are layers beneath the...

December Special Focus - AOPG Journalist Travel...

Every year, AOPG journalists are invited to cover different conferences around the world....

Malaysia’s biggest data breaches in 2019

Cybersecurity is still a big concern for Malaysian organisations. Yet, many organisations...

C-Level Forum : Profiling Cybercriminals To Protect...

Cybersecurity Asean (CSA) ran an event focusing on the strategies in profiling...

Infographic to The Email Threat Surface

Email is the number one exploited vector for cyber attacks. It is therefore important for...

Infographic to Email Continuity

Email is an essential business communication tool in any organisation, but what happens...

RMiT Executive Briefing: Post-Event Summary E-book

Cybersecurity Asean (CSA) ran an event aimed at addressing the recently introduced RMiT...

The Social Engineering Threat

Cyber criminals today get upclose and personal with potential victims. They are normally...

Pages