sb-as logo
Story image

Cybertech conference highlights rise in APAC cyber attacks

14 Sep 2016

Cyber attacks on APAC companies have jumped from 160 attacks to 1667 attacks in just four months between April and July 2016, and Check Point believes that the Locky ransomware is partly to blame. The ransomware encrypts files on an infected system and then demands ransom payments in Bitcoins.

“There has been a significant increase in cyber-attacks in Asia Pacific and this will only continue to rise. The challenge for organisations is that the authors of these malwares continue to develop variants in attempts to evade detection.” commented Rami Ben Efraim, head of government and defence sectors from Check Point, who was speaking at Cybertech Singapore.

The Cybertech Singapore conference brought together more than 1000 cybersecurity professionals and startups from across the globe.

The conference discussed trends in advanced cyber solutions for IoT and human resources, big data intelligence and aviation.

“Ten years ago the most advance threats were virus and malware, today it is moving ahead.  We are seeing more and more advanced threats, more money is being made from cybercrime than from prostitution or drugs.  These are not hackers, they are attackers.  These attackers manage military style campaigns, they learn the targets and the vulnerabilities and they know how to work like Special Forces. It’s a battlefield in a civilian arena,” comments Brigadier General Ariel Karo, head of intelligence and cyber systems at Rafael.

Meanwhile Sanjay Aurora, Darktrace Asia Pacific managing director, says that organisations need to change their way of thinking about cybersecurity.

“The current approaches to cyber security are not addressing the issue.  The majority of technology is still devoted towards the perimeter defence, whereas more often than not the threat is already inside the network. Organisations therefore need to adopt an ‘immune system’ approach to be able to detect threats inside the network early, before a crisis develops," he says.

Story image
Hybrid IAM solutions are the way of the future, study states
“As this first-of-its-kind research shows, while IT leaders are faced with unique criteria and conditions that shape their IT strategy, hybrid IAM has emerged as a necessity."More
Story image
Major firms disclose breaches in the wake of SolarWinds attack
Microsoft, Shell, GoDaddy, MobiKwik — these are just some of the high-profile company's on the receiving end of sophisticated attacks, writes Bitglass senior director of marketing Jonathan Andresen.More
Link image
Webinar: Securing privileged access to stop attackers in their tracks
Thycotic's immersive webinar will demonstrate how attackers acquire passwords on endpoints and access critical cloud applications — without being detected.More
Link image
Virtual demo: Diagnose network cabling problems with the LinkIQ Cable+Network Tester
If you’re finding it difficult to install access points and cabling, or if you can’t pinpoint an issue with a video camera or end user, the LinkIQ Cable+Network Tester could be exactly what you need. Try a free, fully interactive demo now.More
Story image
Fujitsu, Trend Micro team up to secure private 5G
"We believe that this security solution represents a key technology for applying private 5G to mission-critical areas."More
Story image
Enterprises underutilising security tools, causing teams to burn out
The report unveiled a lack of meaningful ROI metrics when reporting on security progress, as well as disparate opinions on objectives, tool effectiveness and security awareness amongst the organisation between executives and operations on security teams.More