McAfee Labs Report Reviews 30-Year Evolution of Evasion Techniques
Microsoft: Basic security hygiene could prevent a lot of cyberattacks
Mobile malware: Oft overlooked, but no less lethal
Security – It’s all or nothing
SYSTECH LAUNCHES NEW E-BUSINESS INITIATIVES
Could Basic Security Hygiene Have Prevented WannaCry’s Rapid Propagation? Yes.
Ransomware is on the rise and here to stay
What is ransomware and what can you do to mitigate its effects?
TITAN SI Tests: WannaCry Ransomware vs. 8 AV solutions
How to protect your organisation from WannaCry ransomware?
CYBERSECURITY MALAYSIA ISSUES ALERT ON ‘WANNACRY RANSOMWARE’
V-Key’s Executive Team Expands with Addition of Cybersecurity Veteran Tony Chew as Chief Security Architect
Service and data availability: 82-percent of organisations at risk of downtime
Antivirus comparison: Cylance leaves traditional AV in the dust
INTERPOL World 2017 Congress to lead industry dialogue for a unified approach to combat future crime
The growing need for cloud-to-cloud backup
Fortinet Ties Up with Universiti Teknologi PETRONAS to Create Pipeline of Cybersecurity Talent
FCC hands internet privacy duty over to FTC
NEC Joins U.S. Department of Homeland Security “AIS” Initiative for Sharing Cyber Threat Indicators
AFSC 2017: Of Tech, Transparency and Trust
Convenience is the first casualty in the war against cyber crime
RSA Challenges Enterprises to Reimagine Their Identity Strategies
Retarus Boosts E-Mail Security Services
What to watch for in the digital security market in 2017?
Challenges for Secure Communications in 2017
BT signs up trend micro to strengthen security in the cloud
Barracuda Simplifies Web Application Security for AWS Customers
Cloud Security Urgency
Barracuda Networks Web Security Gateway demo
BAE Systems Cybersecurity 2017 predictions
Network and endpoint protection for an IoT era
Weather the New-Age War or Destruct
Barracuda Lauds Security Commission’s Cyber Security Guidelines for Malaysia
Industrial cybersecurity: Eight years behind enterprise security
Cyber danger in an operational technologies world
Symantec Unveils the Future of Endpoint Security
A Closer Look
Cisco Transforms Endpoint Security with AMP for Endpoints
SC Releases Guidelines to Enhance Cyber Resilience of the Capital Market
FOCUS 16 – Intel Security Unveils its Commitment with a New McAfee Logo
In-depth cyber defense: Foundation rules to follow
CSM-ACE 2016: Malaysia’s cyber resiliency plans
CSM-ACE 2016 launches with Cyber Resiliency theme
Cybersecurity strategies must include early detection systems
Automated Security vs. Manual Security: It’s 50-50, folks
Cyber securing an island republic: Singapore shows it means business
One hour before launch: SICW or Singapore International Cyber Week 2016
Global Average Connection Speed Increases 14 Percent Year over Year, According to Akamai’s ‘Second Quarter, 2016 State of the Internet Report’
Applying transparency for cybersecurity in Asia
Can you afford not to insure yourself against cyber threats?
Datablink Blinks Bright To Secure Financial Transaction
Data Held Hostage? Back it up fervently
Zooming in on cybersecurity-risky users
The visibility challenge in cybersecurity
F-Secure Evaluates File Retrieval from Ransomware Hits
“RSA Says: End Dependency on Perimeter-based Security”
Barracuda Expands Cloud-Ready Next-Generation Firewall Technology
Barracuda Expands Cloud-Ready Next-Generation Firewall Technology
EU adopts first cybersecurity rules, ups reporting requirements
Cloudera’s Security Architect on data and security
COMMENT: Akamai’s scale of distribution to mitigate attacks at the edge
Reinventing next-generation firewalls for coordinated protection
COMMENT: Akamai’s Fran Trentley on the Akamai advantage
The best security against Internet “user error”? You won’t like the answer
Threat Advisory: Trivial File Transfer Protocol (TFTP) Reflection DDoS
Check Point Software – On Singapore’s National Cybersecurity initiatives
Next-generation data security will rely on silicon and artificial intelligence
SWIFT attackers’ malware linked to more financial attacks
The New IP Sets a High Bar for Cybersecurity
Combatting the Ransomware Epidemic Requires Layered Security
Virtual Security: Innovative Solutions for Sophisticated Cyberattacks
SophosLabs Research Finds “Designer” Cyber Threats on the Rise
Dell Security Tackles Remote Workforce Challenges
Symantec offers peek into underground Web
Security Integration: Bracing Businesses for Digitisation
Avaya’s Smart Campus solution at ATF 2016, Bangkok
Diana Kelley leads IBM in the Fight Against the Dark Web
Going back to endpoint security
One in three Malaysian Internet users have experienced cybercrime the past year
Managing bots for better security and Web experience
The Apple Hack: A Problem Specifically Engineered To Protect Us
Fuss-free Office 365 migration
Symantec: Singular focus in a diverse region
One vendor for all your security needs
More than just access, we need to build Gen Z’s digital skills
Akamai’s Q3 2015 Security Report shows record number of DDoS attacks
All-important board level buy in for security: finally here?
Card not present – APAC’s risk
The nature of cyberthreats: covert, malicious and from within
Akamai’s security advantage
Attacks on financial institutions, more sophisticated than ever
RSA APJ 2015: What’s next?
GovernmentWare 2015, Singapore
Uncertainty: Security in the IoT era
Focused security for device, apps, content
GovernmentWare 2015: Building a secure smart nation
Akamai’s gatekeeper approach to security
Security embedded into content delivery network
Getting in front of the IoT trend
Tailored security solutions
Windows 10: The end of a computing security paradigm?
The Future of Cybersecurity Hinges on Boardroom Engagement Today
Physical, virtual, cloud – Extending protection across them all
RSA APJ 2015 kick off in Singapore
RSA APJ 2015: Accept failure
Cisco increases deeper visibility into threats on the network
RSA APJ 2015 kicks off
The first five crucial security steps
Securing electronic payments
GST – Government Service Tax or Getting Security Toughened
The National University of Singapore (NUS) Faculty of Engineering today released the results of its new study, “Cybersecurity Risks from..
McAfee Inc. today released its McAfee Labs Threats Report: June 2017, which examines the origins and inner workings of the..
At Microsoft’s Cyber Trust Experience 2017, in Singapore, Regional Director of Microsoft Asia’s Digital Crimes Unit and Assistant General Counsel,..
In May, WannaCry ransomware attack infected 300,000 machines crippling businesses in at least 150 countries. Adylkuzz, a cryptocurrency miner took advantage of the..
ESET researchers discover Industroyer, the biggest threat to industrial control systems since Stuxnet
ESET researchers analyzed samples of the malware, detected by ESET as Win32/Industroyer, capable of performing an attack on power supply..
By: Naresh Desai, Vice President, Specialist Business, Asia Pacific at Tech Data Cybersecurity has been a hot topic of late..
Systech Bhd, a Bursa Malaysia-ACE Market listed e-Business Solutions provider, announced two major e-business initiatives, marking its expansion and depth..
By Nigel Tan, Asia Pacific Business Development Executive, IBM Security On Friday, May 12th, cybercriminals launched what is believed to..
There has been a surge in ransomware incidents globally, and the latest ‘Wanna’ ransomware attacks also known as WannaCry, WCry,..
By Nishal Bipinchandra, Head of ERM (Global IT and Security) at Felda Global Ventures Holdings Berhad Ransomware is a malicious..