menu
  • Admin login
  • AOPG Downloads

  • verified_user Admin login
close
  • Cybersecurity

  • Document: November 2024 Special Focus: Unmasking the Tool Bloat Problem: Is There Such a Thing as Too Much Security?
    File: November 2024 Special Focus: Unmasking the Tool Bloat Problem: Is There Such a Thing as Too Much Security?.pdf
    launch
  • Document: September 2024 Special Focus: The Unseen Adversary: Decrypting The Looming Threats of AI Gone Astray Introduction
    File: September 2024 Special Focus: The Unseen Adversary: Decrypting The Looming Threats of AI Gone Astray Introduction.pdf
    launch
  • Document: N-able: Managed Detection and Response Service
    File: N-able: Managed Detection and Response Service.pdf
    launch
  • Document: How to balance compliance and personalisation in a privacy-conscious world
    File: How to balance compliance and personalisation in a privacy-conscious world.pdf
    launch
  • Document: 5 Signs It’s Time to Upgrade Your Identity Programme
    File: 5 Signs It’s Time to Upgrade Your Identity Programme.pdf
    launch
  • Document: September 2023 Special Focus: The Rise of Automotive Hacking
    File: September 2023 Special Focus: The Rise of Automotive Hacking.pdf
    launch
  • Document: July 2023 Special Focus: Cybercrime-as-a-Service: The New Side Hustle
    File: July 2023 Special Focus: Cybercrime-as-a-Service: The New Side Hustle.pdf
    launch
  • Document: Dell PowerEdge - Cyber Resilient Infrastructure for a Zero Trust world -
    File: Dell PowerEdge - Cyber Resilient Infrastructure for a Zero Trust world - .pdf
    launch
  • Document: The State of Cybersecurity Culture Survey Report
    File: The State of Cybersecurity Culture Survey Report.pdf
    launch
  • Document: Sygnia Case Study: Cracking a Global Adversary-in-the-Middle Campaign Using a Threat Intelligence Toolkit
    File: Sygnia Case Study: Cracking a Global Adversary-in-the-Middle Campaign Using a Threat Intelligence Toolkit.pdf
    launch
  • Document: Tenable's OT Cyber Security Considerations Checklist
    File: Tenable's OT Cyber Security Considerations Checklist.pdf
    launch
  • Document: Securing Manufacturing: An Active Directory Security Perspective
    File: Securing Manufacturing: An Active Directory Security Perspective.pdf
    launch
  • Document: April 2023 Special Focus: Synthetic Identity Fraud: Dealing With a Digital Frankenstein
    File: April 2023 Special Focus: Synthetic Identity Fraud: Dealing With a Digital Frankenstein.pdf
    launch
  • Document: PowerEdge - Cyber Resilient Infrastructure for a Zero Trust world
    File: PowerEdge - Cyber Resilient Infrastructure for a Zero Trust world.pdf
    launch
  • Document: PowerEdge - Cyber Resilient Infrastructure for a Zero Trust world (MY)
    File: PowerEdge - Cyber Resilient Infrastructure for a Zero Trust world (MY).pdf
    launch
  • Document: Breaking Through With Modern Security: How CIOs Can Enhance Cyber Resilience (MY)
    File: Breaking Through With Modern Security: How CIOs Can Enhance Cyber Resilience (MY).pdf
    launch
  • Document: ESG Research Summary - Cyber-resiliency Maturity in Servers
    File: ESG Research Summary - Cyber-resiliency Maturity in Servers.pdf
    launch
  • Document: Seamless Application Security: Security at the Speed of DevOps
    File: Seamless Application Security: Security at the Speed of DevOps.pdf
    launch
  • Document: CSA's Executive Briefing Note on Simplifying SASE : What Is Secure Access Service Edge and How Can It Help You?
    File: CSA's Executive Briefing Note on Simplifying SASE : What Is Secure Access Service Edge and How Can It Help You?.pdf
    launch
  • Document: 5 Tips for Defending Against Ransomware
    File: 5 Tips for Defending Against Ransomware.pdf
    launch
  • Document: Cloud Adoption and Risk 2019
    File: Cloud Adoption and Risk 2019.pdf
    launch
  • Document: [E-Book]Securing Your Business With a Security Fabric Approach
    File: [E-Book]Securing Your Business With a Security Fabric Approach.pdf
    launch
  • Document: October 2021 Special Focus: Quantum Safe Security
    File: October 2021 Special Focus: Quantum Safe Security.pdf
    launch
  • Document: August 2021 Special Focus: Security Process Automation
    File: August 2021 Special Focus: Security Process Automation.pdf
    launch
  • Document: Complexity In Cybersecurity Report 2019
    File: Complexity In Cybersecurity Report 2019.pdf
    launch
  • Document: May 2021 Special Focus: Securing The invisible Perimeter
    File: May 2021 Special Focus: Securing The invisible Perimeter.pdf
    launch
  • Document: Thales Data Threat Report APAC Edition 2021
    File: Thales Data Threat Report APAC Edition 2021.pdf
    launch
  • Document: Build a strong defence against cyberattack
    File: Build a strong defence against cyberattack
    launch
  • Document: March 2021 Special Focus: Zero Trust Security
    File: March 2021 Special Focus: Zero Trust Security.pdf
    launch
  • Document: [E-Book] Ensuring Successful Implementation of the Malaysia Cyber Security Strategy (MCSS) 2020-2024
    File: [E-Book] Ensuring Successful Implementation of the Malaysia Cyber Security Strategy (MCSS) 2020-2024.pdf
    launch
  • Document: Infographic: Sharing Corporate Data with Internal and External Users Without Compromising Security
    File: Infographic: Sharing Corporate Data with Internal and External Users Without Compromising Security.pdf
    launch
  • Document: The Key Pillars for Protecting Sensitive Data in Any Organization
    File: The Key Pillars for Protecting Sensitive Data in Any Organization.pdf
    launch
  • Document: Special Focus: Understanding the Need for Zero Trust
    File: Special Focus: Understanding the Need for Zero Trust.pdf
    launch
  • Document: Thales e-Book: Securing a New Digital Landscape
    File: Thales e-Book: Securing a New Digital Landscape.pdf
    launch
  • Document: Upgrading Existing Security Systems to Agile Quantum-Safe with SafeNet Luna HSMs and SafeNet High Speed Encryptors
    File: Upgrading Existing Security Systems to Agile Quantum-Safe with SafeNet Luna HSMs and SafeNet High Speed Encryptors.pdf
    launch
  • Document: Taking IT Out Of The Shadows By Shining A Light On Your Data
    File: Taking IT Out Of The Shadows By Shining A Light On Your Data.pdf
    launch
  • Document: Malwarebytes Infographic: Avoiding the Cybersecurity Hubris
    File: Malwarebytes Infographic: Avoiding the Cybersecurity Hubris.pdf
    launch
  • Document: Malwarebytes Infographic: Emotet is back! Protect your organisation!
    File: Malwarebytes Infographic: Emotet is back! Protect your organisation!.pdf
    launch
  • Document: How to Choose a Managed Security Provider
    File: How to Choose a Managed Security Provider.pdf
    launch
  • Document: Malwarebytes Q2 Report - Cybercrime Tactics and Techniques
    File: Malwarebytes Q2 Report - Cybercrime Tactics and Techniques.pdf
    launch
  • Document: How to Choose a Managed Security Provider.
    File: How to Choose a Managed Security Provider..pdf
    launch
  • Document: September 2020 Special Focus: Shadow IT
    File: September 2020 Special Focus: Shadow IT.pdf
    launch
  • Document: Catching Fraudsters In The Act Anywhere At Anytime
    File: Catching Fraudsters In The Act Anywhere At Anytime.pdf
    launch
  • Document: Cybersecurityasean.com Top ASEAN LinkedIn Security Influencers 2020
    File: Cybersecurityasean.com Top ASEAN LinkedIn Security Influencers 2020.pdf
    launch
  • Document: Blackberry Desktop Enable Secure Remote Connectivity from Any Windows 10 Or MacOS Device
    File: Blackberry Desktop Enable Secure Remote Connectivity from Any Windows 10 Or MacOS Device.pdf
    launch
  • Document: IBM Security Webinar - Best Practices & How Organizations Can Drive a Cybersecurity Behavioural Change Program - REGISTRATION SG
    File: IBM Security Webinar - Best Practices & How Organizations Can Drive a Cybersecurity Behavioural Change Program - REGISTRATION SG
    launch
  • Document: IBM Security Webinar - Best Practices & How Organizations Can Drive a Cybersecurity Behavioural Change Program - ATTENDANCE SG
    File: IBM Security Webinar - Best Practices & How Organizations Can Drive a Cybersecurity Behavioural Change Program - ATTENDANCE SG
    launch
  • Document: IBM Security Webinar - Best Practices & How Organizations Can Drive a Cybersecurity Behavioural Change Program. - ATTENDANCE
    File: IBM Security Webinar - Best Practices & How Organizations Can Drive a Cybersecurity Behavioural Change Program. - ATTENDANCE
    launch
  • Document: IBM Security Webinar - Best Practices & How Organizations Can Drive a Cybersecurity Behavioural Change Program - REGISTRATION
    File: IBM Security Webinar - Best Practices & How Organizations Can Drive a Cybersecurity Behavioural Change Program - REGISTRATION
    launch
  • Document: Infoblox Advanced DNS Protection
    File: Infoblox Advanced DNS Protection.pdf
    launch
  • Document: April 2020 Special Focus - Social Engineering
    File: April 2020 Special Focus - Social Engineering.pdf
    launch
  • Document: Barracuda’s Complimentary Covid-19 Phishing Simulation and Awareness Campaign
    File: Barracuda’s Complimentary Covid-19 Phishing Simulation and Awareness Campaign.pdf
    launch
  • Document: Cybersecurity Asean Guide to Creating a Security Policy For Online Video Meetings
    File: Cybersecurity Asean Guide to Creating a Security Policy For Online Video Meetings.pdf
    launch
  • Document: Webinar-How To Monitor Your Growing Threat Landscape and Build a Consolidated Picture
    File: Webinar-How To Monitor Your Growing Threat Landscape and Build a Consolidated Picture
    launch
  • Document: How The Falcon Platform Aligns With The CIS Critical Control
    File: How The Falcon Platform Aligns With The CIS Critical Control.pdf
    launch
  • Document: C-Level Forum : Profiling Cybercriminals To Protect Your Data Privacy Event Summary E-book
    File: C-Level Forum : Profiling Cybercriminals To Protect Your Data Privacy Event Summary E-book.pdf
    launch
  • Document: RMiT Compliance Executive Briefing Post-Event E-book
    File: RMiT Compliance Executive Briefing Post-Event E-book.pdf
    launch
  • Document: CSA Decision Maker's Checklist for Choosing a Total Email Protection Solution
    File: CSA Decision Maker's Checklist for Choosing a Total Email Protection Solution.pdf
    launch
  • Document: The Future of Cybersecurity in Asia Pacific and Japan – Culture, Efficiency, Awareness
    File: The Future of Cybersecurity in Asia Pacific and Japan – Culture, Efficiency, Awareness.pdf
    launch
  • Document: Cyber Security CMAS Services by Ingram Micro
    File: Cyber Security CMAS Services by Ingram Micro.pdf
    launch
  • Document: Nefarious AI and AI-Based Cyber Attacks- Should We Be Afraid?
    File: Nefarious AI and AI-Based Cyber Attacks- Should We Be Afraid?.pdf
    launch
  • Document: Do We Understand Malware in South Asia? Supported by Malwarebytes
    File: Do We Understand Malware in South Asia? Supported by Malwarebytes.pdf
    launch
  • Document: July Special Focus - The Cyber Threat Actor Landscape
    File: July Special Focus - The Cyber Threat Actor Landscape.pdf
    launch
  • Document: What to Do BEFORE All Hell Breaks Loose: Cybersecurity for Today’s Extreme Threats
    File: What to Do BEFORE All Hell Breaks Loose: Cybersecurity for Today’s Extreme Threats.pdf
    launch
  • Document: The Rise Of Machine Learning In Cybersecurity
    File: The Rise Of Machine Learning In Cybersecurity.pdf
    launch
  • Document: Barracuda Email Threat Scanner for Office 365
    File: Barracuda Email Threat Scanner for Office 365 .pdf
    launch
  • Document: State of Cybersecurity 2019
    File: State of Cybersecurity 2019.pdf
    launch
  • Document: Cybersecurity Asean's Executive Guide Managing Email Cyber Risks supported by Barracuda
    File: Cybersecurity Asean's Executive Guide Managing Email Cyber Risks supported by Barracuda.pdf
    launch
  • Document: Malwarebytes Webinar: You Got Breached. Now What? Are You Secure in Your Security Strategy?
    File: Malwarebytes Webinar: You Got Breached. Now What? Are You Secure in Your Security Strategy?
    launch
  • Document: C-Level Cyber Security Round Table Supported by Ingram Micro, Fortinet & IBM
    File: C-Level Cyber Security Round Table Supported by Ingram Micro, Fortinet & IBM.pdf
    launch
  • Document: Top 7 Office 365 Security Use Cases for a CASB
    File: Top 7 Office 365 Security Use Cases for a CASB.pdf
    launch
  • Document: The Phishing Phenomenon: How To Keep Your Head Above Water
    File: The Phishing Phenomenon: How To Keep Your Head Above Water.pdf
    launch
  • Document: 2019 CROWDSTRIKE GLOBAL THREAT REPORT
    File: 2019 CROWDSTRIKE GLOBAL THREAT REPORT.pdf
    launch
  • Document: Webinar - Understanding the Tactics and Techniques of Cybercriminals
    File: Webinar - Understanding the Tactics and Techniques of Cybercriminals
    launch
  • Document: Cybersecurity Asean Executive Briefing Note to Securing The Interconnected World
    File: Cybersecurity Asean Executive Briefing Note to Securing The Interconnected World.pdf
    launch
  • Document: July Special Focus - The Very Real IoT Cyber Threat supported by Barracuda
    File: July Special Focus - The Very Real IoT Cyber Threat supported by Barracuda.pdf
    launch
  • Document: Guide To AV Replacement
    File: Guide To AV Replacement .pdf
    launch
  • Document: Where To Invest Next: Guidance For Maturing Cyber Defenses
    File: Where To Invest Next: Guidance For Maturing Cyber Defenses.pdf
    launch
Return to home page
Copyright © 2019