As the technological landscape shifts, so too does the difficulty of ensuring the security of our information. Quantum computing is a major concern since it might theoretically crack our existing encryption technologies in...
Networks are the backbone of any effective cybersecurity strategy. Yet when more complex and advanced attacks emerge, keeping the network secure might seem like a gargantuan task.
To shed light on this issue, CSA spoke to...
The human aspect of cybersecurity is vital. In fact, it can spell the difference between cybersecurity that works and one that doesn’t.
People, unfortunately, continue to be the weakest links when it comes to...
While it is no secret that cybercrime (also known as "e-crime") is on the rise, what is surprising is the sharp uptick in attacks launched by nation-state adversaries.
When compared to common cybercriminals,...
Every cyber threat is a concern. But ransomware is arguably the biggest threat today, especially for organisations in Southeast Asia. In fact, research by Kaspersky found that approximately two-thirds of businesses in the region...
Data loss and disruption due to security breaches are a constant danger for modern businesses. Increasingly complex attacks, the rise of telecommuting, and the vulnerability of the workforce to social engineering techniques are...
Zero-Trust is beyond a buzzword by this time. It is even more than just strategy. It is now a paradigm, a philosophy. Actually, zero-trust is the standard in cybersecurity now—and beyond.
Daniel Kwong, Field Chief...
These days, almost every browser has a built-in password manager that can store login information for websites and services. In fact, the choice is typically shown as a pop-up window with the word "save" highlighted as...
It used to be that passwords kept personal and sensitive information safe. Nowadays, a password may very well be a free pass for the modern cybercriminal—savvy and sophisticated and all sorts of sly.
Last year’s...
Many organisations still have reservations about migrating all or a portion of their infrastructure and digital ecosystem to the cloud due to security concerns over the increased vulnerability exposure. The addition of deep...