THE STATE OF CYBERSECURITY IN ASIA-PACIFIC

June 29, 2017

The world is in the midst of massive technological change. Unprecedented breakthroughs are bringing the physical and digital worlds closer than ever before, pushing businesses and governments to rethink production, management and governance systems. Yet even as newer, more complex technologies, such as big data, analytics, machine learning, artificial intelligence and the internet of things, promise to open up a world of unparalleled growth opportunities, the risk of confidential data being maliciously collected, stored and disseminated is on the rise. Indeed, it is not so much a matter of if private information is secure, but how it is likely to be stolen or misused. In the Asia-Pacific region, this risk is further compounded by the fact that cybersecurity is still a relatively nascent sector.

Spotlight

Katipo Information Security Ltd

Katipo Information Security offers real-time protection against threats. We put a security agent in your office which acts on vulnerabilities and malicious activity on your network. The agent protects you from attacks from the outside as well as from within, as many threats are initiated from within the business.

OTHER WHITEPAPERS
news image

Webex App Security Cloud Collaboration Security Technical Paper

whitePaper | November 24, 2022

Webex is a cloud collaboration platform that provides messaging, calling, and meeting features. The Webex App is a client application that connects to this platform and provides a comprehensive tool for teamwork. Users can send messages, share files, make calls, and meet with different teams, all in one place. This security technical paper provides an overview of the security features of Webex App running on Windows, Mac, iOS, Android, Linux, ChromeOS, and Web.

Read More
news image

VIRSEC ® SECURITY PLATFORM

whitePaper | December 10, 2019

Advanced application attacks that weaponize at runtime (WRT) are increasingly putting businesses at risk. These attacks challenge application security by leveraging fileless malware, memory corruption and uncommon vulnerabilities to evade traditional security solutions. WRTs manipulate legitimate processes and enable stealthy execution of malicious code, resulting in data breaches, damaged infrastructure, and financial losses.

Read More
news image

N-able N-central Security White Paper

whitePaper | June 22, 2023

As an integral component of your IT management system, N-able N-central® complements an organization’s existing security policies and infrastructures. N-able N-central consists of a number of components that were specifically designed to provide flexibility as well as to ensure the integrity of the security of the networks on which N-able Ncentral operates.

Read More
news image

Security and Privacy White Paper

whitePaper | October 31, 2022

As cloud-based software solutions become prominent, discussions continue to revolve around security. When organizations implement a cloud-based solution, they put their trust in the solution provider to protect their data and deliver a secure platform.

Read More
news image

Security Overview Whitepaper

whitePaper | February 6, 2023

All encryption/decryption operations are only performed by RoboForm locally on user’s devices and never on the RoboForm Server. RoboForm Data Objects and other user data is never sent to the Server in an unencrypted form. All communication between RoboForm Clients and Server are conducted over encrypted channels only.

Read More
news image

Systemic Cybersecurity Risk and role of the Global Community: Managing the Unmanageable

whitePaper | November 29, 2022

In February 2022, a cyberattack on commercial satellite services in Ukraine caused electricitygenerating wind farms to shut down across Central Europe. In July 2021, supermarkets in Sweden were forced to close their doors after a cyberattack on an IT services provider based in Florida, USA.

Read More

Spotlight

Katipo Information Security Ltd

Katipo Information Security offers real-time protection against threats. We put a security agent in your office which acts on vulnerabilities and malicious activity on your network. The agent protects you from attacks from the outside as well as from within, as many threats are initiated from within the business.

Events