X-PHY Deepfake Detector
X-PHY Deepfake Detector Read More »
The CISO Middle East Summit 2025 (UAE Edition – Dubai) is set to be one of the most influential cybersecurity events in the region, bringing together leading experts, decision-makers, and innovators in the cybersecurity landscape. Taking place in Dubai, this exclusive summit offers a unique platform for Chief Information Security Officers (CISOs), cybersecurity professionals, and
CISO Middle East Summit 2025 Read More »
The CyberSecID 2024 Summit emerges as a cornerstone event tailored for cybersecurity professionals in Indonesia. This summit stands as a catalyst fostering immersive dialogues addressing challenges and nurturing the exchange of best practices within the dynamic realm of cybersecurity particularly its impact on various sectors across Indonesia. Featuring over 20 esteemed speakers and panelists from
CyberSecIndonesia 2024 Conference Read More »
Cybersecurity Malaysia Conference (CyberSecMalaysia) is a premier event tailored for security professionals across various sectors in Malaysia. This conference serves as a pivotal platform for in-depth discussions, addressing challenges, and sharing the best practices in the rapidly evolving landscape of the security industry. The conference will feature sessions and presentations that delve into the latest
Cybersecurity Malaysia Conference 2024 Read More »
Escom’s Cyber Security Philippines (CSP) is aligned with the vision of “Cyber Security in the Age of Digital Transformation”, it’s designed for security professionals across various sectors in the Philippines to discuss and debate on the challenges and solutions of its digitalization. The CSP will gather 150 senior security experts such as CIOs, CSOs, Compliance
Cybersecurity Philippine Conference 2024 Read More »
Do a quick internet search for enterprise security strategy, and you’ll likely come across the term “zero-trust” with varying definitions from some of the biggest names in the tech game. Enterprise security means different things to different people, as the many definitions show us. But key to adopting an effective security strategy is determining a
Achieving an Assume Breach Culture Within Your Organization Read More »
APAC has seen a dramatic increase in both the volume and consequences of cyber-attacks, with several of the most high-profile breaches in 2022 occurring in the region. In addition to the increase in attacks, APAC businesses are faced with both an increase in the surface area to protect (due to increased use of cloud and
All Access Cyber Security APAC 2023 Read More »
One of the largest economies in Africa, Egypt is now pacing with numerous Government-led initiatives to digitize the country. At a time when there are over 150 technology services accessible on its ‘Digital Egypt’ Platform, the National Telecom Regulatory Authority (NTRA) has also listed Egypt as one of the 20 largest countries in the world
CyFrica Egypt 2023 Read More »
In the past year, the global business sector has experienced an extraordinary level of cyberattacks, which has created challenges for security teams to respond promptly. A significant number of vulnerabilities were identified, and malicious actors are still exploiting many of them in the current year. With Malaysia’s growing dependence on technology and digital infrastructure, ensuring
When you think of the word resilience, what comes to mind? I bet you’re thinking of someone or something who has suffered (to quote the Great Bard) the “slings and arrows of outrageous fortune” but has the fortitude and audacity to become even stronger. That’s a perfectly acceptable definition and I applaud the spirit of
Security Outcomes Report, Volume 3: Achieving Security Resilience Read More »