News & Commentaries >

  1. Targeted attacks have come a long way in recent years, leveraging increasingly advanced techniques aimed at specific individuals. Often, these hackers pinpoint a single person within an enterprise, steal their credentials, […]

    Business Process Compromise: The Next Step in Advanced Targeted Attacks

    Targeted attacks have come a long way in recent years, leveraging increasingly advanced techniques aimed at specific individuals. Often, these hackers pinpoint a single person within an enterprise, steal their credentials, […]
  2. It’s a recurring theme in sports movies, war stories and crime stories alike: In order to defeat the enemy, one must think like the enemy. This approach has been taken […]

    Flying Under the Radar: How Hackers Use Protection Strategies for Attack

    It’s a recurring theme in sports movies, war stories and crime stories alike: In order to defeat the enemy, one must think like the enemy. This approach has been taken […]
  3.   Three messages currently dominate the media on the topic of cybersecurity: the number of cyber-threats is increasing exponentially, the impact from these attacks is growing too, and organisations are […]

    Fixing Asia’s Cybersecurity Gap: Exclusive Interview with Dr Eric Cole

      Three messages currently dominate the media on the topic of cybersecurity: the number of cyber-threats is increasing exponentially, the impact from these attacks is growing too, and organisations are […]
  4.   As cities continue to grow smarter, they will also become easier to hack. With millions (if not billions) of dollars going into research for urban domains and the Internet of […]

    The Jetson’s Cyber Concerns – Future Smart Cities Cybersecurity Checklist

      As cities continue to grow smarter, they will also become easier to hack. With millions (if not billions) of dollars going into research for urban domains and the Internet of […]
  5.   “Fake news” was relatively unheard of last year—until the U.S. election campaign period started, during which an explosion of misinformation campaigns trended. But despite its seemingly rampant spread, fake […]

    Exploring the Online Economy that Fuels Fake News

      “Fake news” was relatively unheard of last year—until the U.S. election campaign period started, during which an explosion of misinformation campaigns trended. But despite its seemingly rampant spread, fake […]
  6. A new Wellington cyber security firm is offering New Zealand businesses a virtual chief information security officer, fulfilling one of the most expensive roles in a company. Cyber Toa chief […]

    New tech company offers virtual cyber defenders

    A new Wellington cyber security firm is offering New Zealand businesses a virtual chief information security officer, fulfilling one of the most expensive roles in a company. Cyber Toa chief […]

Upcoming Events >

  1. CHINA

    CLOUDSEC China 2017

    July 6
    Chengdu
    Find out more »
  2. HONG KONG

    CLOUDSEC Hong Kong 2017

    August 3
    Hong Kong Convention & Exhibition Center, Wanchai, Hong Kong
    Find out more »
  3. AUSTRALIA

    CLOUDSEC Australia 2017

    August 15
    Sydney
    Find out more »
  4. SINGAPORE

    CLOUDSEC Singapore 2017

    August 22
    Singapore
    Find out more »
  5. UNITED KINGDOM

    CLOUDSEC London 2017

    September 5
    London
    Find out more »
  6. TAIWAN

    CLOUDSEC Taiwan 2017

    September 6
    台北
    Find out more »