Cybersecurity leads boardroom agendas among ASEAN organizations in light of pandemic-induced shifts. Palo Alto Networks has released new research into businesses’ attitudes towards cybersecurity ...
No matter how tough the cybercriminals get, these five basic cybersecurity strategies must keep the hospital staff, administration and operations resilient. The healthcare industry in the region ...
To protect your corporate network from a remote workforce, VPNs are essential: just make sure their settings are equally secure! The onslaught of the novel COVID-19 has caught businesses off guard, ...
Based on a survey of global financial industry respondents (no details of methodologies, respondent profiles supplied explicitly) a post-trade market infrastructure for the industry has summarized ...
In an analysis of 54 countries to identify 10 to be ranked in terms of their preparedness for data security threats in 2024, a firm producing a self-hosted and open-source “freemium” password manager ...
Work-from-home and social media dominate Q4 2020 email scams. In the fourth quarter of 2020, real phishing emails that were reported to IT departments related to working from home are on the rise.
The cybersecurity landscape is rapidly evolving, and the dynamics between defenders and attackers has never been more complex. In 2024, the world witnessed cyberthreats evolving faster than before, ...
For the new year, here are some more trends and predictions from cybersecurity experts across Asia Pacific. Since December 2024, we have been featuring cybersecurity trends and predictions from Asia ...
In a fast-evolving threat and technology landscape, cybersecurity together with digital transformation has become a top-of-mind issue at the Board and C-suite levels for organizations across all ...
In addition to knowing never to pay cyber ransoms, here are nine other points to evaluate your organization’s preparedness against attacks. Threat actors have also become very effective at encrypting ...
With the logistics and supply chain industry aggressively embracing digital technologies, cybersecurity assumes a greater significance, argues this CISO In logistics and supply chain operations around ...
Social engineering techniques go beyond email phishing to exploit the remote-working new normal. One of the most common forms of cyber-attack techniques is phishing. However, with more advanced ...