Skip to Content

Articles submitted for www.cybersecasia.net

Advertisement :
Sponsered Links :
The big questions surrounding cloud security

The big questions surrounding cloud security

Submitted by • March 2, 2020

www.cybersecasia.net - Only 31% of organizations believe that protecting data in the cloud is their own responsibility, and just 32% have a security-first approach to cloud data. Why? A new global study from Thales, with research from the Ponemon Institute, has exposed an ...

Three quarters of IT and cybersecurity teams not aligned: study

Three quarters of IT and cybersecurity teams not aligned: study

Submitted by • March 2, 2020

www.cybersecasia.net - More than 77% of respondents cited a tussle between IT and cybersecurity teams. It is the start of a new decade, and the cybersecurity battle of “good vs evil” rages on. Experts see tougher challenges in the years ahead, and their work ...

INFOGRAPHIC: Are APAC businesses ready for their transformation?

INFOGRAPHIC: Are APAC businesses ready for their transformation?

Submitted by • March 2, 2020

www.cybersecasia.net - A regional study of the state of data security in Asia Pacific. To find out how ready enterprises are, Gemalto (Thales) engaged Ecosystm to conduct market research on the state of data security for the region. A regional study of the ...

Another retrospective of 2019’s threat landscape

Another retrospective of 2019’s threat landscape

Submitted by • February 26, 2020

www.cybersecasia.net - If looking at the past helps prepare you for the present, here is another cybersecurity retrospective to boost your cyberpreparedness… OpenText has issued its 2020 Webroot Threat Report for last year, highlighting not only the agility and innovation of cybercriminals who ...

5 APAC cybersecurity issues looming large on the horizon

5 APAC cybersecurity issues looming large on the horizon

Submitted by • February 24, 2020

www.cybersecasia.net - From 2019’s cyberthreat trends, we know threat actors are eyeing our region for even more ambitious attacks to come. With developed countries in APAC grasping at 5G technology and Industry 4.0 leadership, and emerging economies embracing a hyper-online mobile presence, the ...

Singapore Police Force deploys new eKYC system

Singapore Police Force deploys new eKYC system

Submitted by • February 21, 2020

www.cybersecasia.net - Singapore Police Force is now using multispectral fingerprint imaging technology for fast and fraud-free driver’s license processing. The traffic branch of the Singapore Police Force has deployed an electronic Know Your Customer (eKYC) system that uses HID Global’s HID Lumidigm V-series ...

Will the complexities of 5G security destroy its potential?

Will the complexities of 5G security destroy its potential?

Submitted by • February 20, 2020

www.cybersecasia.net - 5G networks are incredibly complex, and the deployment of infrastructure elements at the edge makes them more difficult to secure. The mobile communications industry is set to be revolutionised by 5G. This will enable new services and use cases that go ...

Research report links social media impersonation of US politicians to Iranian interests

Research report links social media impersonation of US politicians to Iranian interests

Submitted by • February 19, 2020

www.cybersecasia.net - "In just three weeks since Singapore’s first Covid-2019 case, there have been reports of cybercriminals impersonating government officials to request financial information from individuals. The local authorities have since advised financial institutions to remain vigilant on the cybersecurity front. The ...

Cybercrooks helping to do Covid-19 contact tracing?

Cybercrooks helping to do Covid-19 contact tracing?

Submitted by • February 19, 2020

www.cybersecasia.net - "In just three weeks since Singapore’s first Covid-2019 case, there have been reports of cybercriminals impersonating government officials to request financial information from individuals. The local authorities have since advised financial institutions to remain vigilant on the cybersecurity front. The ...

Advertisement :
Page : 1 / 3 1 2 3 Last ›