Cyber-Ark Software specialises in protecting and managing privileged users, sessions, applications and sensitive information, that contribute toward improving compliance, productivity and protecting organisations...
Cybersecurity: Not just resiliency, but also sustainability
Cyber-physical Systems Vulnerability Disclosures Reach Peak
Cyber threats on the rise: The widespread use of breached credentials
Lookout announces industry’s only endpoint to cloud security platform
The rise of non-human identities
Fixing and finding vulnerabilities – syncing the two
Security is a team sport: Get used to this
Dealing with new devils using existing investments? Possible
Identity – the first layer of cybersecurity
Scaling out technology, vast experience, for actionable cybersecurity insight
FIRMUS-PCC conference – Industry stalwarts voice out cybersecurity hopes and concerns
Firmus’ 2022 cybersecurity conference to Reconnect, Relearn, Recharge
The cybersecurity landscape and digitalisation hangover
NetAssist announces collaboration to deliver Fálaina Managed IAM Services
Not on our watch
Skyhigh’s Security Services Edge approach
Accenture cyberthreat report: Cloud-centric and Zero Trust
Fortinet’s 2022 initiatives
When FireEye and McAfee Enterprise come together: Trellix
Making SIEM accessible to all
Securonix’s APJ business momentum led by Cloud-native SIEM adoption and partner program expansion
Equinix on Data Privacy and Protection
Delivering cybersecurity ratings to critical sectors in Malaysia
Software Bots Have Sharing Issues Too
FIRMUS partners with Vectra to expose hidden cyberattacks faster with AI
Zero Trust approaches in APAC
Vaccine credentials – Rising motivation for identity theft in healthcare
Taking a Pause to Secure cryptocurrency trading
Complying to Risk Management in IT requirements
Network access for sale on dark web
Ransomware evolution
Poised and ready for growth in SEA
APAC a lucrative region for threat actors
Edge to cloud security with choice
Risk-based vulnerability management for effective patch management
Securing Healthcare Internet of Things: Privacy vs Availability
Stalkerware show up security and privacy issues
Infoblox’s view of the SIEM, the SOAR and the SOC.
Breach, leak or scrape? There can still be data misuse
Cyber insurance: Data science to calculate cyber risks and premiums
Cyberinsurance’s “insurance” against ransomware payout
DNS security for foiling data exfiltration
Tapping into Zero Trust for added security controls
Disrupting the Pareto botnet with Human
Secure remote access for operational tech
Data collection: Too fast, too furious
Threat intelligence sharing more crucial than ever
Keeping tabs on IoT security
Drama Bulan Ini: The UniKL Hack
Intsights report: Key Learnings for FSI
The Cybersecurity Agenda: Pandemic-Driven
An ecosystem-wide IronNet to catch bad behaviours
A Happy Threats Defense Day
Security against cloud compromise
Taking your organisation on the cybersecurity journey
Next-gen Cybersecurity – How can Malaysia do better?
Thriving in the New Normal: A quicktake of APJ
Addressing the 800lb cybersecurity gorilla in the room
Malaysia’s inclusive cybersecurity strategy (MCSS) launches today
Incentivising default cyber hygiene
Tales from Ep.1: Banks, BINS, and “Bad” Guys
Info sharing for cybersecurity
LAEDA: Privacy double standards?
White Ops discovers 29 fraudulent apps on Google’s app store
High-risk attack surfaces now and before
Huawei locked out of UK’s 5G network
Reducing the use of passwords
Utilising threat intel: More sectors onboard
WFH Series Finale: What is Cybersecurity’s Endgame?
Enabling secure but accelerated digital transformations
Cisco Radically Simplifies Security for Today’s Accelerated IT Agenda
Pulse Secure Responds to Growing Demand for Integrated Platforms with New Pulse Access Suite Plus
Zooming into Zoom
COVID-19 impact on Telcos: The situation so far
Malaysia’s communications resiliency during pandemic times
APAC’s cybersecurity standards catching up to rest of world?
CGD’s RMiT Series 2020
A scary spear-phishing attack
A DLP solution for Malaysia
CGD Annual Cybersecurity Summit 4.0
Harnessing DNS for next-level security at the speed of digital
Secure data recovery and sanitisation with MyCyberClinic
Cloud HR with a security emphasis
CyberSecurity Malaysia Collaboration Program to optimise industry resources
Relaxed rules for export of cyberweapons cause for concern
Analysts acknowledge Retarus in latest Email Security market overviews
Tales of the Leaky Cloud
7 Evergreen tips for securing IoT
Singapore’s data breach: What are the lessons for Malaysia?
Barracuda launches two-prong attack against spear phishing
Cybersecurity certifications on the fast track
The DNA of a Systematic Automotive Failure
Explosive Growth in Connected Devices Drive the Need for Better Threat Intelligence
Infoblox: DNS as your first line of defense against shadow IT
Silverlake Builds Intel-based, ‘Hard’ Security
Public-private cybersecurity collaborations formalised
T-Systems opens Common Criteria Evaluation Lab in Singapore
BNM’s Risk Management in Technology policy for FSI due out 1st June
Cybersecurity Landscape Predictions in 2019 by Forcepoint
Virtual Forge: Security vulnerabilities boils down to Code
CTOS introduces SecureID
Self-driving to Security
Under the radar cyber attacks costing financial services companies $924,390 and getting worse
Progressing with technology and best practices
Securing the Internet’s address book
Network & Security Data to Discover what we Don’t Know yet
Infoblox: Network management for more security insight
Monetary Authority of Singapore (MAS) proposes ways to enhance financial sector cyber resilience
Too Many Companies are Overlooking Servers in their Endpoint Security Strategy
Reinforcing the Security Chain
31 million web threats YTD2018 in Malaysia according to Kaspersky Lab
Single (Infoblox) pane of glass for DNS security
Belt & Road Initiative – target of increased snooping activities
Prevention vs Detect & Response: It’s time to Converge
FireEye Cautions Malaysian Firms of Heightened Cyber Risk
Your business ecosystem: An ill-fitting Jigsaw Puzzle?
Firmus’ 7th CIO Cybersecurity Conference with PIKOM CIO Chapter
Synchronising security devices for faster protection
Cybersecurity threats to cost Malaysian businesses US$12.2 billion
Cybersecurity’s never ending challenge
Networks: The number one pathway for malware
Cyberthreat Intelligence: Get the basis of analysis right
Supply chain the new weak link in business security as ransomware increases
RSA Conference 2018: Buzzworthy Topics Wrap Up
The Growing Adoption of Multi-Cloud in Malaysia: Mitigation Strategies for Enterprises
Barracuda on cloud security at RSA Conference 2018
Protection by isolation: An elegant blend of security and usability at last?
Avoid a Breach – 5 Tips to Secure Data Access
RM200 million earmarked for local cybersecurity startups with potential
Top 2018 CISO Priorities Part 1: Everyone is an insider threat
Quann Malaysia: Beware Potential Cybersecurity Threat in Clickbait Links on Malaysian Election
Cybersecurity Summit highlights risk of privacy breaches
Adapting security tooling to blockchain-developed software
Closing the gap between public-private cybersecurity partnerships
Threat Brief: A Declining Rig Exploit Kit Hops on the Coinmining Bandwagon
Combating DDoS Attacks in Malaysia: It’s more than just a Defence Mechanism
Barracuda Security Insight: Nearly 41 million PDF files weaponised for cyberattacks
Combating DDoS Attacks in Malaysia: It’s more than just a Defence Mechanism
Digital Twinning: The Future of Manufacturing?
Protecting your identity with secure cards
Quann Malaysia Warns of Rising QR Code Scams
Carbon Black 2017 Threat Report: Non-Malware Attacks and Ransomware Continue to Own the Spotlight
MADIoT – The nightmare after XMAS (and Meltdown, and Spectre)
What’s the Deal with Encrypted Backup Drives?
The Big Chipzilla Fudge (Up): Breadth and Depth of the Mistake
First Step to Network Security & Protection: Reignite your firewall
Barracuda Cautions Against the Use of Outdated Backup Tapes
Akamai State of the Internet / Security Report: Significant Increase in Web Application Attacks, Evolution of Attacker Strategies
CrowdStrike Expands Endpoint Protection Platform with New Vulnerability Management Module
Cybersecurity issues discussed at MIA Conference 2017
The Telco Industry Leak: Updates
Dark Web Ransomware Economy Growing at an Annual Rate of 2,500%
What that recent massive data leak will look like to us
Internet of Threats: Cloud accounts are targeted by cybercriminals
Sophos XG Firewall Delivers a Breakthrough in Network Visibility with Synchronized App Control
ESET Works with Google to halt dangerous malware
Bad Rabbit: Price of decryption increases after 40 hours
Data Backup’s end goal: Disaster recovery
FICO Doubles the Power of Cybersecurity Score to Predict Breaches
Internal violators are the most serious threat to data privacy in Southeast Asia
Oracle Announces Industry’s First Cloud-Native, Intelligent Security and Management Suite
OOW 2017: Securing the database
Gemalto helps banks and payment providers simplify and streamline encryption operations
Palo Alto Networks Unveils APAC WildFire Cloud in Singapore
Google chooses Quann as its cybersecurity partner in Asia Pacific
Aruba Atmosphere 15 years later: Beyond just a gathering of Airheads
Aruba Atmosphere 2017: Bringing contextual intelligence to network security
Cybersecurity 101: Above all else, obfuscate the enemy
Who can it be knocking on my door?
Math vs. Malware, Signatures vs. AI
The Crowdstrike rationale
An SD-WAN can cure your security blues
Fortinet: Cyber Attacks Becoming Smarter & More Automated in 2017
Living on a prayer: SMB bug from WannaCry attack, still not being patched
Cybersecurity for your business: Where’s your head at right now?
Extending cybersecurity’s efficacy with integrated response
Cloud isn’t a tactic to shift privacy and security responsibilities
Singapore’s Cybersecurity Bill: No Man is an Island, global alignment needed for true effectiveness
New McAfee Report Reveals Secrets of Successful Threat Hunters and SOCs
Business-driven security: Putting intent back into execution
Real-World Spear Phishing, Initiating the Attack and Email Spoofing
Check Point Teams with Microsoft Intune to Secure Enterprise Mobility
Backups: The absolutely necessary security hygiene measure
Encryption: The passive protection difference
Singapore’s proposed Cybersecurity Bill: Check Point Software weighs in
5 Questions Every Company Should Be Asking Their IT Director in the Wake of Cyberattacks
Armada Collective deadline passes: The aftermath
Orchestrating threat lifecycles for reduced time to detect and respond
Cyber insuring for a rainy day
Security for the modern enterprise
MCI and CSA Seek Public Feedback On Proposed Cybersecurity Bill
Brokerage firms warned: 12th July 2017 deadline to pay ransom or be DDoS-ed
Securing the network, in a hyper-connected world
Time to Turn SMB Herd Mentality into a Mutual Defense Strategy
Mitigating common cyber threats
Golden Eye aka Petya ransomware: One week later
Wannacry, Erebus, and Mole made last week a big week for ransomware
The Top Cloud Security Concerns for Malaysian Manufacturers
NUS Study: Cybercriminals Exploit Pirated Software to Fuel Malware Infections in Asia Pacific
McAfee Labs Report Reviews 30-Year Evolution of Evasion Techniques
Microsoft: Basic security hygiene could prevent a lot of cyberattacks
Mobile malware: Oft overlooked, but no less lethal
Attacks in cyberspace: The business of cyber-insuring
Security – It’s all or nothing
SYSTECH LAUNCHES NEW E-BUSINESS INITIATIVES
Could Basic Security Hygiene Have Prevented WannaCry’s Rapid Propagation? Yes.
Ransomware is on the rise and here to stay
What is ransomware and what can you do to mitigate its effects?
TITAN SI Tests: WannaCry Ransomware vs. 8 AV solutions
How to protect your organisation from WannaCry ransomware?
CYBERSECURITY MALAYSIA ISSUES ALERT ON ‘WANNACRY RANSOMWARE’
V-Key’s Executive Team Expands with Addition of Cybersecurity Veteran Tony Chew as Chief Security Architect
Service and data availability: 82-percent of organisations at risk of downtime
Antivirus comparison: Cylance leaves traditional AV in the dust
INTERPOL World 2017 Congress to lead industry dialogue for a unified approach to combat future crime
The growing need for cloud-to-cloud backup
Fortinet Ties Up with Universiti Teknologi PETRONAS to Create Pipeline of Cybersecurity Talent
FCC hands internet privacy duty over to FTC
NEC Joins U.S. Department of Homeland Security “AIS” Initiative for Sharing Cyber Threat Indicators
AFSC 2017: Of Tech, Transparency and Trust
Convenience is the first casualty in the war against cyber crime
RSA Challenges Enterprises to Reimagine Their Identity Strategies
Retarus Boosts E-Mail Security Services
What to watch for in the digital security market in 2017?
Challenges for Secure Communications in 2017
BT signs up trend micro to strengthen security in the cloud
Barracuda Simplifies Web Application Security for AWS Customers
Cloud Security Urgency
Barracuda Networks Web Security Gateway demo
BAE Systems Cybersecurity 2017 predictions
Network and endpoint protection for an IoT era
Weather the New-Age War or Destruct
Barracuda Lauds Security Commission’s Cyber Security Guidelines for Malaysia
Industrial cybersecurity: Eight years behind enterprise security
Cyber danger in an operational technologies world
Symantec Unveils the Future of Endpoint Security
A Closer Look
Cisco Transforms Endpoint Security with AMP for Endpoints
SC Releases Guidelines to Enhance Cyber Resilience of the Capital Market
FOCUS 16 – Intel Security Unveils its Commitment with a New McAfee Logo
In-depth cyber defense: Foundation rules to follow
CSM-ACE 2016: Malaysia’s cyber resiliency plans
CSM-ACE 2016 launches with Cyber Resiliency theme
Cybersecurity strategies must include early detection systems
Automated Security vs. Manual Security: It’s 50-50, folks
Cyber securing an island republic: Singapore shows it means business
One hour before launch: SICW or Singapore International Cyber Week 2016
Global Average Connection Speed Increases 14 Percent Year over Year, According to Akamai’s ‘Second Quarter, 2016 State of the Internet Report’
Applying transparency for cybersecurity in Asia
Can you afford not to insure yourself against cyber threats?
Datablink Blinks Bright To Secure Financial Transaction
Data Held Hostage? Back it up fervently
Zooming in on cybersecurity-risky users
The visibility challenge in cybersecurity
F-Secure Evaluates File Retrieval from Ransomware Hits
“RSA Says: End Dependency on Perimeter-based Security”
Barracuda Expands Cloud-Ready Next-Generation Firewall Technology
Barracuda Expands Cloud-Ready Next-Generation Firewall Technology
EU adopts first cybersecurity rules, ups reporting requirements
Cloudera’s Security Architect on data and security
COMMENT: Akamai’s scale of distribution to mitigate attacks at the edge
Reinventing next-generation firewalls for coordinated protection
COMMENT: Akamai’s Fran Trentley on the Akamai advantage
The best security against Internet “user error”? You won’t like the answer
Threat Advisory: Trivial File Transfer Protocol (TFTP) Reflection DDoS
Check Point Software – On Singapore’s National Cybersecurity initiatives
Next-generation data security will rely on silicon and artificial intelligence
SWIFT attackers’ malware linked to more financial attacks
The New IP Sets a High Bar for Cybersecurity
Combatting the Ransomware Epidemic Requires Layered Security
Virtual Security: Innovative Solutions for Sophisticated Cyberattacks
SophosLabs Research Finds “Designer” Cyber Threats on the Rise
Dell Security Tackles Remote Workforce Challenges
Symantec offers peek into underground Web
Security Integration: Bracing Businesses for Digitisation
Avaya’s Smart Campus solution at ATF 2016, Bangkok
Diana Kelley leads IBM in the Fight Against the Dark Web
Going back to endpoint security
One in three Malaysian Internet users have experienced cybercrime the past year
Managing bots for better security and Web experience
The Apple Hack: A Problem Specifically Engineered To Protect Us
Fuss-free Office 365 migration
Symantec: Singular focus in a diverse region
One vendor for all your security needs
More than just access, we need to build Gen Z’s digital skills
Akamai’s Q3 2015 Security Report shows record number of DDoS attacks
All-important board level buy in for security: finally here?
Card not present – APAC’s risk
The nature of cyberthreats: covert, malicious and from within
Akamai’s security advantage
Attacks on financial institutions, more sophisticated than ever
RSA APJ 2015: What’s next?
GovernmentWare 2015, Singapore
Uncertainty: Security in the IoT era
Focused security for device, apps, content
GovernmentWare 2015: Building a secure smart nation
Akamai’s gatekeeper approach to security
Security embedded into content delivery network
Getting in front of the IoT trend
Tailored security solutions
Windows 10: The end of a computing security paradigm?
The Future of Cybersecurity Hinges on Boardroom Engagement Today
Physical, virtual, cloud – Extending protection across them all
RSA APJ 2015 kick off in Singapore
RSA APJ 2015: Accept failure
Cisco increases deeper visibility into threats on the network
RSA APJ 2015 kicks off
The first five crucial security steps
Securing electronic payments
GST – Government Service Tax or Getting Security Toughened
CyberSecurity
Articles
A recent report on tablet adoption in Malaysia showed a massive growth by 87% (or 384,000 units) in 2012 as compared to 2011....
- 28 Feb
- 0
- 0
Here’s a scary thought – Over 75% of all cyber attacks target databases.To address this, a focused McAfee security event on 12th March,...
- 27 Feb
- 0
- 0
By Graham Cluley, senior technology consultant, Sophos# And when two lovers woo They still say, “I love you.” On that you can rely No matter what...
- 21 Feb
- 0
- 0
By Cat YongFor the last 4 months, Chinese hackers waged a silent onslaught upon The New York Times, successfully infiltrating it, and stealing...
- 17 Feb
- 0
- 0
Sophos has launched the latest version of Sophos Mobile Control 3.0 (SMC 3.0) which is offered as a ‘behind the firewall’ solution as well as...
- 14 Feb
- 0
- 0
By Sumit Bansal, Director of Sales, ASEAN, Sophos Organisations have entered a new stage of technology that offers end users far greater independence...
- 22 Jan
- 0
- 0
By Inbavanan R, General Manager Asia Pacific, Lifecycle Solutions & Services, Honeywell Process Solution“May you live in interesting times”, often referred to as...
- 18 Jan
- 0
- 0
By Dave Martin, vice president, Edgewater Networks If you were to ask most IT professionals to connect CRM or ERP applications to an...
- 14 Jan
- 0
- 0
By Brandon Teoh This is the second part to EITN’s recorded security threats in the year 2012. Part 1 can be found here. Trends about ICT security...
- 3 Jan
- 0
- 0
By Ivan Wen, country manager, Sourcefire Malaysia“An ounce of prevention is worth a pound of cure,” the famous phrase coined by one of...
- 2 Jan
- 0
- 0
By Cat Yong 2011 was a big year security-wise for Malaysia. For reasons we shall not get into that shall forever remain ‘Anonymous’,a...
- 25 Dec
- 0
- 0
Recent News
- Motorola Solutions Turns 50 in Singapore: How the Company Combines Safety Technology with Community Engagement
- Cyberport Venture Capital Forum 2024 Builds New Venture Visions
- How Software is Changing the Way We Respond to Emergencies
- Cloudera demonstrates Enterprise AI is a team sport at EVOLVE24, New York
- Insulated Innovation Towards True Hybrid
- Motorola Solutions Unveils New Software and Analytics R&D Centre in Vietnam
- Salesforce launches new program to help 5,000 Singapore SMEs
- Bursa Malaysia launches API Gateway for an Enhanced Investors’ Onboarding Experience
- From sports events to natural disasters – why mission critical technology is needed in any event
- Communicating Through Crisis – why Motorola Solutions Backs Technologies that Strengthen Safety and Resilience
- NTT announces key technology predictions for 2024
- Cologne Bonn Airport to enhance TETRA digital radio network with Motorola Solutions
- Motorola Solutions Expands Mobile Video Portfolio with LTE-Enabled Body Camera
- Motorola Solutions Reveals New Brand Identity
- HID elevates textile management efficiency and integration with tags