Press Release
    March 14, 2025

    APNIC Foundation and ISC2 Partner To Enhance Asia Pacific Cybersecurity Skills

    Cybersecurity training in the Asia Pacific region is set to be enhanced with an agreement signed today…
    Press Release
    March 14, 2025

    OpenText Launches Next Generation OpenText Cybersecurity Cloud With AI Powered Threat Detection and Response Capabilities

    OpenText announced OpenText™ Core Threat Detection and Response, a new AI-powered cybersecurity solution for threat…
    Press Release
    March 14, 2025

    CyberArk Acquires Zilla Security to Reshape Identity Governance and Administration for the Modern Enterprise

    CyberArk, the global leader in identity security, today announced it has acquired Zilla Security, a leader in modern Identity Governance and Administration (IGA) solutions. Zilla’s innovative, AI-powered…
    Bylines
    March 13, 2025

    Resilient Network Security: Fortifying the Backbone of a Smart Nation

    By Ayush Sharma, Chief Technology Officer, StarHub In today’s interconnected world, a robust network system…
    Press Release
    March 13, 2025

    Eviden Launches Evidian Orbion: A Next-Generation, comprehensive Cloud- Based Identity and Access Management Solution

    Eviden, the Atos Group business leading in digital, cloud, big data and security today announces the launch of Evidian Orbion, its next-generation…
    Press Release
    March 13, 2025

    Armor Collaborates with Oracle to Help Organisations Protect Their Critical Workloads

    Armor, a leading provider of cybersecurity and compliance solutions, today announced it has joined the…
    Press Release
    March 13, 2025

    New TXOne Networks OT/ICS Cybersecurity Report Details Growing Range of Risks Facing Companies as Digital Transformation Unfolds Globally

    TXOne Networks, a leader in Cyber-Physical Systems (CPS) security, published its new annual report on…
    Press Release
    March 12, 2025

    Valid Accounts Showed Significant Increase As Initial Attack Vector in 2024

    Valid accounts are increasingly being leveraged as an initial attack vector in 2024, representing 31.4%…
    Press Release
    March 12, 2025

    Netskope Sets New Standard on Infrastructure Requirements for Modern Security and Networking

    Netskope, a leader in modern security and networking, today announced new technology advancements for NewEdge, the carrier-grade…
    Press Release
    March 12, 2025

    1datapipe™ Introduces Next-Generation Living Identity™ Intelligence in SEA to Strengthen Digital Security and Expand Financial Access

    Southeast Asia’s digital transformation is accelerating, with millions gaining access to online financial services. However,…
      March 5, 2025

      Experts Address Key Cybersecurity Threats and Challenges Facing Manufacturing at FMM-CSA Collaborative Event

      On 26th February, Cybersecurity Asia (CSA) and the Federation of Manufacturing Malaysia (FMM) held the “Cybersecurity in Manufacturing: Making Things…
      February 12, 2025

      Bitdefender Reports UAC-0063 Cyber-Espionage Campaign Is Expanding Beyond Central Asia

      A recent report from cybersecurity firm Bitdefender reveals that UAC-0063, a cyber-espionage group previously active in Central Asia, has expanded…
      January 23, 2025

      Cybercriminals Exploiting Microsoft Teams and Email Bombing in New Ransomware Tactics

      Cybercriminals are leveraging Microsoft Teams, email bombings, and remote access tools to orchestrate sophisticated ransomware campaigns, according to recent findings…
      January 20, 2025

      Cisco AI Defense: A Revolutionary Step or a Necessary Complexity in AI Security?

      On 16th January 2025, Cisco hosted a virtual roundtable to launch its highly-anticipated Cisco AI Defense, a platform aimed at…
      January 7, 2025

      Tech Tarik Think Tank Explores the Future of Digital Identities and Trust

      Technology is catapulting us into a future that is ever more connected, efficient and undeniably digital. And based on the…
      November 6, 2024

      Digital Vendetta: The Malicious Impact of Disgruntled Employees

      While businesses pour resources into defending against cyber attacks from the outside, an often-overlooked risk is a far more personal…
      October 10, 2024

      UNODC Report Reveals Criminal Gangs in Asia Getting Big Assist From AI, Crypto, and More

      Criminals, assemble! That appears to be happening in Asia right now, with organised crime syndicates consolidating their groups and expanding…
      October 2, 2024

      Quantum Threat to Cryptography: Experts Warn of an Extinction-Level Event in Digital Trust

      Quantum computing is hitting the headlines, and most of the time for good reasons. As tech players like Microsoft and…

      Blogs

        Blogs
        February 26, 2025

        Breaking the Cycle: Preventing Re-Victimisation in Cyber Extortion Attacks

        Cyber extortion has evolved into multi-layered threats that go beyond locking systems and demanding ransom, combining data encryption with tactics…
        Blogs
        February 25, 2025

        Are You Overlooking Your Digital Blind Spots? How EASM Can Protect What You Can’t See

        What does the future of enterprise technology look like? According to a survey by IoT Analytics, it will be shaped…
        Blogs
        February 4, 2025

        Threat Detection Alone Won’t Cut It: Is Your Organisation Truly Cyber Resilient?

        The idea that cyber threats are evolving isn’t new, but the pace and complexity of threats facing today’s organisations definitely…
        Blogs
        November 18, 2024

        Generative AI & Quantum Risks: Are You Prepared for the Next Wave of Cybersecurity?

        The rise of generative AI is changing the industry and opening doors to creativity and innovation that seemed unattainable just…
        Blogs
        September 26, 2024

        When the Shield Gets Breached: How VPN Vulnerabilities Highlight the Need for Everywhere Security

        With the dust of the remote work revolution finally settling, it’s evident that many businesses have adopted a more hybrid…
        Blogs
        September 18, 2024

        Three Hidden Web Application Vulnerabilities You Need to Know About

        In today’s hyper-connected world, web applications are the backbone of many organisations, driving everything from customer engagement to backend operations.…
        Blogs
        September 5, 2024

        Disrupting the Disruptor: A Step-by-Step Strategy to Stonewall DDoS Attacks

        Service delays are bad for business. Service denial is even worse. Distributed Denial-of-Service (DDoS) attacks can do both, overwhelming a…
        Blogs
        August 27, 2024

        The Criticality of Security: How to Address the Modern Challenge of Securing APIs

        Application Programming Interfaces (API) are dominating the Internet, with successful API requests accounting for 57% of the Internet traffic (dynamic…