Securing cloud environments against identity-based and AI-driven threats in 2025
By CybersecAsia editors | Jul 1, 2025
Here are some practical strategies to defend against evolving cloud attacks, including credential theft, social engineering, and advanced AI-enabled techniques.
Read MoreWith increasing IT/OT convergence, reacting to any cyber incident is already too late!
By Girish Ramachandrachari, Principal Cybersecurity Solution Architect, Orange Cyberdefense (APAC) | Jun 30, 2025
Especially in APAC, the fallout from cyber extortion and related threats is too severe for organizations to rely on reactive strategies
Read MoreFive essential strategies for securing multi-cloud environments
By Jess Ng, Country Head (Singapore and Brunei), Fortinet | Jun 27, 2025
Organizations adopting multi-cloud need to address new cybersecurity challenges with integrated tools, skilled teams, and proactive strategies to ensure operational resilience
Read MoreHarden your Windows 11 installation before your life story is leaked!
By L L Seow | Jun 24, 2025
Here are five detailed measures that IT admins/home users can take to control what personal data is being leaked
Read MoreClosing the gap in Zero Trust implementation: What you need to consider
By Kenneth Lai, Area Vice President (ASEAN), Cloudflare | Jun 18, 2025
Organizations investing in Zero Trust may struggle to unify controls, risking exposure to AI-driven attacks, supply chain breaches, and compliance pressures.
Read More‘Want to avoid Swiss Cheese cybersecurity? Heed Hammurabi’s Code!
By John Kindervag, Chief Evangelist, Illumio | Jun 17, 2025
Cybersecurity, like structural engineering, needs a tried-and-tested set of foundational measures to avoid Swiss Cheese-style problems. Find our more here.
Read MoreHow vigilant are you to sneaky phishing tactics?
By Vlad Cristescu, Head of Cybersecurity, ZeroBounce | Jun 13, 2025
Some phishing communications do not even contain links. Do they qualify as phishing attacks? Find out below.
Read MoreKnow the four most common password mistakes
By CybersecAsia editors | May 27, 2025
Weak, short, or predictable passwords are easily cracked; use strong, unique combinations and enable advanced authentication for better protection.
Read MoreHow to outsmart filename masquerading: A practical guide to safer file handling
By L L Seow | May 26, 2025
An age-old cybercriminal tactic has been rejuvenated, thanks to popular AI platforms that generate sought-after images and video files for download.
Read MoreCan RCS improve on the antiquated SMS technology?
By Lim Jiun Kei, Head of Operator Partnership (APAC), Infobip | May 21, 2025
Learn how Rich Communication Services may help counter phishing and scams, while remaining mindful of its evolving risks and limitations.
Read More
Voters-draw/RCA-Sponsors
CybersecAsia Voting Placement
Gamification listing or Participate Now
PARTICIPATE NOW |
|
Vote Now -Placement(Google Ads)
Top-Sidebar-banner
Whitepapers
2024 Insider Threat Report: Trends, Challenges, and Solutions
Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download WhitepaperAI-Powered Cyber Ops: Redefining Cloud Security for 2025
The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download WhitepaperData Management in the Age of Cloud and AI
In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download WhitepaperMitigating Ransomware Risks with GRC Automation
In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper
Middle-sidebar-banner
Case Studies
St Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network
With only a small IT team, the digital transformation has united operations across 30 locations, …Read moreAutomating border control and security with facial recognition technology
Indonesia Immigration & Seaport Authorities enhances security and speeds up border control queues at Batam …Read moreSecuring wealth advisory services without unnecessary friction: Endowus
The wealth advisory platform demonstrates its non-negotiable commitment to a robust security posture through partnering …Read moreLifeTech group sets up next-gen security operations center in Malaysia
By partnering with a unified cybersecurity platform, the firm will be offering cost-effective advanced SOC …Read more