cybersecasia.net

cybersecasia.net is SSL secured

Free website and domain report on cybersecasia.net

Last Updated: 27th September, 2021 Update Now
Overview

Snoop Summary for cybersecasia.net

This is a free and comprehensive report about cybersecasia.net. The domain cybersecasia.net is currently hosted on a server located in Singapore in Singapore with the IP address 18.140.38.73, where the local currency is SGD and Mandarin is the local language. Our records indicate that cybersecasia.net is privately registered by Domains By Proxy, LLC. Cybersecasia.net has the potential to be earning an estimated $1 USD per day from advertising revenue. If cybersecasia.net was to be sold it would possibly be worth $819 USD (based on the daily revenue potential of the website over a 24 month period). Cybersecasia.net is somewhat popular with an estimated 389 daily unique visitors. This report was last updated 27th September, 2021.

About cybersecasia.net

Site Preview: cybersecasia.net cybersecasia.net
Title: CybersecAsia | Asia's most trusted enterprise cybersecurity information portal
Description: CybersecAsia covers every aspect of cybersecurity in Asia: from the cyberthreat landscape and cybersecurity strategies, to websites protection and data privacy and more! CybersecAsia readers gain key insights on industry trends and developments along with the digital transformation of their business. We, cyber security news site attract C-suite leaders, directors, VPs, senior business and technology managers involved in ensuring security within end-user organizations across all industry secto...
Keywords and Tags: business
Related Terms: amex business trends and insights, asia insights, business trends and insights, cloud security and cybersecurity, comodo cybersecurity, cybersecurity compliance company, cybersecurity degrees, cybersecurity news, cybersecurity solutions, trends and insights
Fav Icon:
Age: Over 5 years old
Domain Created: 17th June, 2019
Domain Updated: 18th June, 2021
Domain Expires: 17th June, 2022
Review

Snoop Score

1/5

Valuation

$819 USD
Note: All valuation figures are estimates.

Popularity

Low
Note: Popularity is estimated.

Rank, Reach and Authority

Alexa Rank: 3,052,418
Alexa Reach:
SEMrush Rank (US):
SEMrush Authority Score:
Moz Domain Authority: 0
Moz Page Authority: 0

Organic vs Paid (Google Ads)

Traffic

Visitors

Daily Visitors: 389
Monthly Visitors: 11,840
Yearly Visitors: 141,985
Note: All visitors figures are estimates.

Visitors By Country

Revenue

Revenue

Daily Revenue: $1 USD
Monthly Revenue: $34 USD
Yearly Revenue: $405 USD
Note: All revenue figures are estimates.

Revenue By Country

SEO

Backlinks Analysis (SEMrush)

Top New Follow Links

Top Ranking Keywords (US)

Domain Analysis

Value Length
Domain: cybersecasia.net 16
Domain Name: cybersecasia 12
Extension (TLD): net 3
Expiry Check:

Page Speed Analysis

Average Load Time:
Load Time Comparison:

PageSpeed Insights

Avg. (All Categories) 60
Performance 36
Accessibility 73
Best Practices 80
SEO 75
Progressive Web App 36
0–49 (Fail) 50–89 (Average) 90–100 (Pass)
Simulate loading on desktop
36

Performance

Indicates how well the page is performing and highlights opportunities where performance may be improved for cybersecasia.net. This includes details about optimizing page load times which can result in a better user experience.

Opportunities

Minify CSS
Cascading Style Sheets (CSS) files can contribute to network payload sizes. Cybersecasia.net should consider minifying CSS files.
Minify JavaScript — Potential savings of 16 KiB
JavaScript (JS) files can contribute to network payload sizes and increase script parse times. Cybersecasia.net should consider minifying JS files.
URL Transfer Size (Bytes) Potential Savings (Bytes)
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/pickadate/picker.js?ver=2.2.5
9608
6139
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/pickadate/picker.date.js?ver=2.2.5
10882
5895
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/pickadate/picker.time.js?ver=2.2.5
7961
4141
Preconnect to required origins
Resource hints, such as 'preconnect' or 'dns-prefetch', may assist in establishing early connections to important third-party origins.
Preload key requests
Key requests can be preloaded by using '<link rel=preload>'. Cybersecasia.net should consider using '<link rel=preload>' to prioritize fetching resources that are currently requested later in page load.
Remove duplicate modules in JavaScript bundles
Ensure that no duplicate JavaScript modules from bundles exist to reduce bytes consumed by network activity.
Avoid serving legacy JavaScript to modern browsers — Potential savings of 31 KiB
Polyfills and transforms enable legacy browsers to use new JavaScript features. For bundled JavaScript it is recommended to adopt a modern script deployment strategy using module/nomodule feature detection. This will reduce the amount of code shipped to modern browsers.
URL Potential Savings (Bytes)
https://www.cybersecasia.net/wp-content/plugins/popups-for-divi/scripts/ie-compat.min.js?ver=3.0.3
10845
https://www.cybersecasia.net/wp-content/plugins/add-search-to-menu/public/js/ivory-ajax-search.min.js?ver=4.6.6
8426
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/simplebar.min.js?ver=2.2.5
8374
https://api.popin.cc/searchbox/cybersecasia.js
4509
Preload Largest Contentful Paint image
It is recommended to preload images used by LCP elements, to improve LCP time.

Diagnostics

Avoid chaining critical requests — 79 chains found
Below is a list of Critical Request Chains, which shows which resources are loaded with a high priority. Cybersecasia.net should consider reducing the length of chains, reducing the download size of resources, or deferring the download of unnecessary resources to improve page load.
User Timing marks and measures — 3 user timings
Make use of the User Timing API to measure an app's real-world performance during key user experiences.
Name Type Start Time (Ms) Duration (Ms)
gpt-tag-load
Mark
7459.296
gpt-first-ad-request
Mark
7615.453
gpt-first-ad-render
Mark
7726.15
Keep request counts low and transfer sizes small — 377 requests • 61,217 KiB
It is advised to add a budgets.json file in order to set budgets for the quantity and size of page resources.
Resource Type Requests Transfer Size (Bytes)
Total
377
62685993
Image
200
60115864
Script
89
1794207
Font
11
271213
Stylesheet
33
218218
Document
8
144646
Other
36
141845
Media
0
0
Third-party
156
57505438
Minimize third-party usage — Third-party code blocked the main thread for 110 ms
It is advised to either limit, remove or delay the loading of redundant third-party code which may be significantly impacting load performance.
Third-Party Transfer Size (Bytes) Main-Thread Blocking Time (Ms)
706736
58.734
2010312
52.931
52837427
0
165282
0
64267
0
40029
0
21669
0
Lazy load third-party resources with facades
Consider replacing third-party embeds with a facade until they are required (use lazy loading).
Largest Contentful Paint element — 1 element found
The element which was identified as the Largest Contentful Paint.
Element
Largest Contentful Paint image was not lazily loaded
Above-the-fold images that are lazily loaded render later in the page lifecycle, which can delay the largest contentful paint.
Element
Uses passive listeners to improve scrolling performance
Improve the page's scroll performance by marking touch and wheel event listeners as 'passive'.
Avoid long main-thread tasks — 16 long tasks found
Below is a list of the longest tasks on the main thread, which is useful when identifying the worst input delay contributors.
URL Start Time (Ms) Duration (Ms)
https://www.cybersecasia.net/wp-includes/js/jquery/jquery.min.js?ver=3.6.0
34700
179
https://www.cybersecasia.net/wp-includes/js/jquery/jquery.min.js?ver=3.6.0
44326
108
Unattributable
219
104
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021092001.js?31062913
35700
89
https://www.googletagmanager.com/gtag/js?id=UA-145136419-1
44207
87
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__en.js
43902
85
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__en.js
43820
82
https://www.cybersecasia.net/wp-includes/js/jquery/jquery.min.js?ver=3.6.0
34882
66
https://www.cybersecasia.net/wp-includes/js/jquery/jquery.min.js?ver=3.6.0
34622
62
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__en.js
44100
60
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
900
55
https://tpc.googlesyndication.com/safeframe/1-0-38/js/ext.js
45480
54
https://www.cybersecasia.net/wp-content/themes/Extra/scripts/scripts.min.js?ver=4.10.8
20240
53
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__en.js
43995
53
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
801
52
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
998
52
Avoid non-composited animations — 4 animated elements found
It is recommended to avoid non-composited animations which are often janky and increase CLS.
Element Name
1
2
Has a `<meta name="viewport">` tag with `width` or `initial-scale`
It is advised to use a '<meta name="viewport">' tag for the optimization of cybersecasia.net on mobile screens.

Budgets

Performance budget
It is advised to keep the quantity and size of all network requests under the targets set by the provided performance budget.
Timing budget
It is advised to set a timing budget to monitor the performance of your site.

Other

Network Requests
Below is a list of network requests that were made during page load.
URL Protocol Start Time (Ms) End Time (Ms) Transfer Size (Bytes) Resource Size (Bytes) Status Code MIME Type Resource Type
http://cybersecasia.net/
http/1.1
0
1059.9850001745
314
0
301
text/html
https://cybersecasia.net/
http/1.1
1060.5930001475
2537.0990000665
306
0
301
text/html
https://www.cybersecasia.net/
h2
2537.6630001701
5652.4380000774
70992
480389
200
text/html
Document
https://www.cybersecasia.net/wp-content/plugins/smart-slider-3/Public/SmartSlider3/Application/Frontend/Assets/dist/smartslider.min.css?ver=821e0c40
h2
5665.648000082
6588.9990001451
3810
23692
200
text/css
Stylesheet
https://www.google.com/recaptcha/api.js?render=6LcOQLAUAAAAAJE6aHUcEpbVmTsNus99g_88TITd
h2
5665.827000048
5673.6080001574
1202
884
200
text/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/wp-social/assets/css/frontend.css?ver=5.8.1
h2
5666.0590001848
6134.8870000802
6848
67426
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/wp-social/assets/css/font-icon.css?ver=5.8.1
h2
5666.2530000322
7008.0350001808
7618
43781
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/add-search-to-menu/public/css/ivory-search.min.css?ver=4.6.6
h2
5666.4710000623
6587.2890001629
1975
6811
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/popups-for-divi/styles/front.min.css?ver=3.0.3
h2
5666.7760000564
7008.5700000636
1960
7647
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/themes/Extra/style.min.css?ver=4.10.8
h2
5666.9810002204
7016.9180000667
43707
365523
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/et-cache/home/et-extra-dynamic.css?ver=1632706266
h2
5669.1080001183
6814.7880001925
1428
8706
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/supreme-modules-for-divi/styles/style.min.css?ver=2.4.0
h2
5669.351000106
6821.8220002018
15157
172553
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-fonticons-ii.css?ver=2.2.5
h2
5669.5320000872
5926.7880001571
5666
41290
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-fonticons-fa.css?ver=2.2.5
h2
5669.9960001279
7043.6280001886
4837
29977
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/select2/select2.min.css?ver=4.0.13
h2
5670.2800001949
6819.3460002076
2259
14966
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-crop.css?ver=2.2.5
h2
5670.5599999987
6818.8360000495
1247
4346
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-modal.css?ver=2.2.5
h2
5670.8260001615
5925.9060001932
1229
3730
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-styles.css?ver=2.2.5
h2
5671.1340001784
6565.4420000501
4488
22134
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-profile.css?ver=2.2.5
h2
5671.6480001342
7015.3580000624
2453
9981
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-account.css?ver=2.2.5
h2
5671.9710000325
5948.1160000432
1427
4492
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-misc.css?ver=2.2.5
h2
5672.1990001388
7009.177000029
999
2161
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-fileupload.css?ver=2.2.5
h2
5672.3090000451
6587.6980000176
1229
3743
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/pickadate/default.css?ver=2.2.5
h2
5672.480000183
5947.740000207
1478
3922
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/pickadate/default.date.css?ver=2.2.5
h2
5672.6840001065
5933.8260001969
1557
6009
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/pickadate/default.time.css?ver=2.2.5
h2
5673.0070000049
7015.5850001611
1024
2543
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-raty.css?ver=2.2.5
h2
5673.1440001167
7018.1420000736
717
1099
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/simplebar.css?ver=2.2.5
h2
5673.3400002122
6564.8270000238
1299
4010
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-tipsy.css?ver=2.2.5
h2
5673.9760001656
6588.0200001411
804
2271
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-responsive.css?ver=2.2.5
h2
5674.5150000788
5931.8400002085
2149
12865
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-old-default.css?ver=2.2.5
h2
5674.6140001342
5931.4110002015
1476
6254
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/themes/TechSites/style.css?ver=1.0.0.1563178420
h2
5676.2720001861
5906.2610000838
4059
18071
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-includes/js/jquery/jquery.min.js?ver=3.6.0
h2
5676.3840001076
5924.5860001538
31177
89521
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/popups-for-divi/scripts/ie-compat.min.js?ver=3.0.3
h2
5676.9160002004
7009.8100001924
3838
9647
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/wp-social/assets/js/social-front.js?ver=5.8.1
h2
5677.0530000795
6132.3900001589
747
459
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-gdpr.min.js?ver=2.2.5
h2
5677.1639999934
6586.7530000396
581
293
200
application/javascript
Script
https://securepubads.g.doubleclick.net/tag/js/gpt.js
h2
7097.6880001836
7122.8570002131
26514
74358
200
text/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/smart-slider-3/Public/SmartSlider3/Application/Frontend/Assets/dist/n2.min.js?ver=821e0c40
h2
5677.2670000792
7017.5460001919
11696
41829
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/smart-slider-3/Public/SmartSlider3/Application/Frontend/Assets/dist/smartslider-frontend.min.js?ver=821e0c40
h2
5677.3990001529
7044.3960002158
29535
129413
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/smart-slider-3/Public/SmartSlider3/Slider/SliderType/Simple/Assets/dist/smartslider-simple-type-frontend.min.js?ver=821e0c40
h2
5677.7720001992
5907.2620000225
4783
23782
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/smart-slider-3/Public/SmartSlider3/Slider/SliderType/Simple/Assets/dist/smartslider-backgroundanimation.min.js?ver=821e0c40
h2
5678.0650001019
6814.158000052
5066
24953
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/uploads/2019/07/CYBERSECasia-logo.png
h2
7097.7640000638
7761.8520001415
2934
2637
200
image/png
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Data-protection-in-the-hybrid-work-environment-440x264.jpg
h2
7097.8600000963
7768.5160001274
27330
32195
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/pegasus-spyware-final-440x264.jpg
h2
7098.1130001601
7782.7410001773
33307
40378
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Dealing-with-the-industrialization-of-fraud-and-scams1-440x264.jpg
h2
7098.1930000708
7342.4880001694
23172
28106
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Dealing-with-%E2%80%98vulnerability-lag-440x264.jpg
h2
7098.2630001381
7550.3310000058
30744
34305
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Rising-supply-chain-ransomware-threats-drive-greater-intel-sharing-in-global-financial-industry-440x264.jpg
h2
7098.3400000259
7555.2410001401
35422
38925
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/2021/Is+there+a+rift+in+your+software+development+and+security+teams.jpg
http/1.1
7098.40300004
10095.626000082
1002205
1001792
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Dealing-with-%E2%80%98vulnerability-lag-284x170.jpg
h2
7098.4900000039
7765.6730001327
19579
23140
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Rising-supply-chain-ransomware-threats-drive-greater-intel-sharing-in-global-financial-industry-60x60.jpg
h2
7098.5750001855
7550.8450001944
10100
13680
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Running+outdated+software+on+your+server.jpg
http/1.1
7098.6630001571
10115.950000007
724736
724324
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Adopting-an-attacker-mindset-is-good-for-cybersecurity-284x170.jpg
h2
7098.7610002048
7783.1830000505
17003
21546
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Is-your-Zero-Trust-posture-true-to-the-new-digitalization-landscape-60x60.jpg
h2
7098.9180000033
7509.6550001763
8657
13275
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Staying-current-is-key-for-security-in-businesses1-60x60.jpg
h2
7099.2880000267
7561.3059999887
9214
16951
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Are-legacy-banks-equal-to-neobanks-in-application-development-security-60x60.jpg
h2
7099.4850001298
8502.250000136
8976
14000
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Love-online-flirting-and-dating-284x170.jpg
h2
7099.5810001623
8272.2570002079
17067
20591
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/How-financial-institutions-can-limit-third-party-vendor-risks-60x60.jpg
h2
7099.9640000518
7982.9040002078
9065
13681
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Ransomware-is-easy-to-deploy-now-but-so-are-defence-strategies-60x60.jpg
h2
7100.1430000179
7983.6950001772
9112
16898
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/online-financial.jpg
http/1.1
7100.258000195
10178.658000194
1048724
1048311
200
image/jpeg
Image
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/zero-trust11.jpg
http/1.1
7100.3630000632
10131.936000194
961854
961442
200
image/jpeg
Image
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/online-banking.jpg
http/1.1
7100.4980001599
9740.7339999918
137213
136801
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Adopting-an-attacker-mindset-is-good-for-cybersecurity-440x264.jpg
h2
7100.5890001543
8500.8100001141
27366
31886
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-21111.jpg
http/1.1
7100.6700000726
9890.7670001499
311486
311074
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-3-21111.jpg
http/1.1
7100.8200000506
9996.8830000143
397125
396713
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Staying-current-is-key-for-security-in-businesses1-440x264.jpg
h2
7100.8920001332
8734.5130001195
30347
38022
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_QuickGuide_2020_EnableSecureYourRemoteWorkforce-440x264.jpg
h2
7100.969000021
7561.7640002165
36298
40393
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_Zero_Trust_Secure_Remote_Access_wp-440x264.jpg
h2
7101.0800001677
7984.0210000984
27073
31746
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/thumbnail-m1-440x264.jpg
h2
7101.1970001273
7984.2940000817
30912
30655
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/Thumbnail-srei-440x264.jpg
h2
7101.3680000324
7570.5910001416
18058
17839
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-top-5-remote-access-problems-440x264.jpg
h2
7101.432000054
7984.5710000955
21022
20882
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-true-cost-of-free-440x264.jpg
h2
7101.5750002116
8501.750000054
34598
34597
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/sakura-new-440x264.jpg
h2
7101.6870001331
7566.4500000421
31208
35618
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/Fortinet-thumbnail-028-440x264.jpg
h2
7101.8050001003
8730.6000001263
19840
20347
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/Thumbnail-0399-440x264.jpg
h2
7101.9060001709
7569.627000019
17411
17871
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Veeam-thumbnail-1-sec.png
http/1.1
7101.9990001805
10354.476000182
1023931
1023519
200
image/png
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Veeam-thumbnail-2-fir.png
http/1.1
7102.0930001978
10453.480000142
1521247
1520835
200
image/png
Image
https://www.cybersecasia.net/wp-content/uploads/2021/07/Keeping-surging-cyber-threats-at-bay-in-the-New-Normal-1-440x264.jpg
h2
7102.1870002151
7570.3500001691
28674
33197
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/07/Kemp-Thumbnail-2-440x264.jpg
h2
7102.390000131
8313.5089999996
16712
17205
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/07/Kemp-Thumbnail-1-final-440x264.jpg
h2
7102.4570001755
7787.4300000258
18112
22084
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/07/ransomware-fortinet-guide-440x264.jpg
h2
7102.52400022
7789.6360000595
36610
40325
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/07/Fortinet-thumbnail-07689792-440x264.jpg
h2
7102.6070001535
7736.8660001084
35381
35407
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Cisco-thumbnail-1-q4.jpg
http/1.1
7103.1860001385
9969.5380001795
523098
522686
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Fortinet+-+thumbnail-0017.jpg
http/1.1
7103.3780002035
9977.0760000683
271447
271035
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/06/Guide-Thumbnail-1-440x264.jpg
h2
7103.4910001326
7788.0460000597
18690
19234
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/06/micro-virty-440x264.jpg
h2
7103.5910001956
8732.5410000049
18912
20070
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/06/hppp333-440x264.jpg
h2
7103.698000079
8963.05700019
29790
33315
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/04/image_2021_04_22T03_12_15_226Z-440x264.jpg
h2
7103.8080002181
8962.639000034
14538
14694
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/06/gartners-magic-1-440x264.jpg
h2
7103.9410000667
8549.4390001986
24785
28458
200
image/jpeg
Image
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/image_2021_05_31T07_10_04_897Z.png
http/1.1
7104.0340000764
10080.89400013
1046736
1046324
200
image/png
Image
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-1+copy.jpg
http/1.1
7104.1810000315
9940.6770002097
479259
478847
200
image/jpeg
Image
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/video-crowdstrike.png
http/1.1
7104.2570001446
10439.47400013
1896164
1895752
200
image/png
Image
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Peril+in+a+Pandemic_032221.jpg
http/1.1
7104.4610000681
9963.0850001704
511953
511569
200
image/jpeg
Image
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/video-fortinet.jpg
http/1.1
7104.869000148
10163.779000053
652350
651938
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/04/quantum-computing-440x264.jpg
h2
7105.0980000291
8565.4560001567
17158
17573
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/04/NTT_thumbnail-001-440x264.jpg
h2
7105.3520001005
8732.0620000828
23714
24186
200
image/jpeg
Image
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Fortinet+-+thumbnail-001.jpg
http/1.1
7105.6000001263
9968.5090000276
254768
254356
200
image/jpeg
Image
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/rep-ossra-2021.jpg
http/1.1
7105.801000027
10219.651000109
647157
646773
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/06/Whitepaper_BlackBerry_ZeroTrust_FINAL-copy-440x264.jpg
h2
7105.9790002182
8964.0300001483
23637
23775
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/03/gartner-pulse-sec-440x264.jpg
h2
7106.0960001778
8786.110999994
14500
15083
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/04/shellcode-440x264.jpg
h2
7106.214000145
8964.4660002086
44857
51619
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/04/ransomware-on-the-Rise-440x264.jpg
h2
7106.4230001066
8785.7760000043
22908
23370
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/04/building-the-foundation-440x264.jpg
h2
7107.1070001926
8275.2940000501
16395
16917
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/03/Pulse-Secure_Thumbnail-1-440x264.jpg
h2
7107.2470000945
8791.0450000782
19853
20232
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/02/AppSec-In-the-DevOps-Environment2-440x264.jpg
h2
7107.3810001835
9022.0550000668
60281
65454
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/01/Thales-thumbnail-2-440x264.jpg
h2
7107.5450000353
8785.1840001531
54128
60836
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/01/threat-landscape-440x264.jpg
h2
7107.6870001853
8788.4580001701
28305
28709
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/12/gartner-report-1-440x264.jpg
h2
7107.8250000719
9440.0610001758
863
1400
404
text/html
Image
https://www.cybersecasia.net/wp-content/uploads/2020/12/2020-ossra-report-1-440x264.jpg
h2
7107.9500000924
9276.3720001094
863
1400
404
text/html
Image
https://www.cybersecasia.net/wp-content/uploads/2021/02/Thumbnail_LP-440x264.jpg
h2
7108.0830001738
9019.8190000374
67682
73066
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/02/Continuous-Security-Putting-it-all-Together-440x264.jpg
h2
7108.2440000027
8560.5210000649
63874
69415
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/02/Continuous-Application-Security-with-HCL-AppScan-440x264.jpg
h2
7108.7900002021
8770.9730002098
54160
59758
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/01/black-440x264.jpg
h2
7108.9520000387
9023.315000115
16209
16545
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/01/Thales-thumbnail-1-440x264.jpg
h2
7109.080000082
9023.6980000045
55011
61615
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/01/prioritize2021-440x264.jpg
h2
7109.167000046
9192.1130002011
56076
56310
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-the-state-of-the-security-team-research-report11-440x264.jpg
h2
7109.2360001057
8965.0590000674
101532
108365
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/01/wp-untangling-the-web-of-cloud-security-threats-440x264.jpg
h2
7109.3120002188
9022.9660000186
26030
31971
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/Horangi-Whitepaper-Selecting-A-CSPM-Solution-440x264.jpg
h2
7109.3850000761
8789.1470000613
22054
22478
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/12/fortinet-video-440x264.jpg
h2
7109.4580001663
9192.5630001351
31074
31923
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/12/THUMBNAIL-TEMPLATE-paloalto-440x264.jpg
h2
7109.5240002032
9257.2710001841
89547
96291
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/12/thumbnail-1-440x264.jpg
h2
7109.5940000378
9502.9200001154
863
1400
404
text/html
Image
https://www.cybersecasia.net/wp-content/uploads/2020/11/wp_2020Malaysia-RMiT-Actionable-Compliance-Guide-440x264.jpg
h2
7109.6550000366
9439.6620001644
863
1400
404
text/html
Image
https://www.cybersecasia.net/wp-content/uploads/2020/11/QuickGuide_Endpoint_Security-440x264.jpg
h2
7109.8230001517
9460.7500000857
863
1400
404
text/html
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/aag-why-cisco-security-for-sb-img-440x264.jpg
h2
7109.8920002114
9021.7230000999
18458
19386
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/11/fortinet1-440x264.png
h2
7109.9770001601
9504.0610001888
863
1400
404
text/html
Image
https://www.cybersecasia.net/wp-content/uploads/2021/01/Untitled-440x264.png
h2
7110.0330001209
9256.303000031
116635
116294
200
image/png
Image
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-trending-phishing-techiques-white-paper-2020-440x264.jpg
h2
7111.0360000748
9193.5350000858
36278
42803
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-security-operations-maturity-model-white-paper-updated-440x264.jpg
h2
7111.6850001272
8790.3150001075
37688
43953
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/145601-Idaptive_Case_Study_New-Zealand-Avocado-440x264.jpg
h2
7111.8400001433
8531.9230000023
17519
18006
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/12/ciso-guide-to-modern-appsec-440x264.jpg
h2
7111.9480000343
9275.7910001092
863
1400
404
text/html
Image
https://www.cybersecasia.net/wp-content/uploads/2020/12/2020-esg-report-440x264.jpg
h2
7112.2610000893
9460.2510000113
863
1400
404
text/html
Image
https://www.cybersecasia.net/wp-content/uploads/2020/11/POV-teleworker-super-user-440x264.jpg
h2
7112.3750000261
9441.4150000084
863
1400
404
text/html
Image
https://www.cybersecasia.net/wp-content/uploads/2020/11/ezgif.com-gif-maker-4-440x264.webp
h2
7112.4770001043
9435.0410001352
863
1400
404
text/html
Image
https://www.cybersecasia.net/wp-content/uploads/2020/11/The-pivotal-role-of-HR-in-cybersecurity-440x264.jpg
h2
7112.5820002053
9504.5559999999
863
1400
404
text/html
Image
https://www.cybersecasia.net/wp-content/uploads/2020/09/7-benefits-of-cloud-email-security-440x264.jpg
h2
7112.6860000659
8764.2820000183
35371
42913
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/Horangi-Case-Study-Wallex-440x264.jpg
h2
7112.8370000515
9193.9809999894
30189
30595
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/Horangi-Case-Study-Zave-440x264.jpg
h2
7113.0690001883
8996.8570000492
27294
27874
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/Gnowbe-Case-Study-440x264.jpg
h2
7113.1610001903
8299.9950000085
26730
27286
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/145609-Idaptive-Six-IT-Security-Risks-WP-EN-v1_new-440x264.jpg
h2
7113.2490001619
8996.1980001535
17043
17870
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/enterprise-firewall-5-tips-img-440x264.jpg
h2
7113.4580001235
8790.6440000515
17434
18173
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/ngfw-futureoffirewalling-wp-img-440x264.jpg
h2
7113.5770000983
8532.4510000646
15860
17167
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/145606-Idaptive-Top-Ten-Considerations-WP-EN-v1-440x264.jpg
h2
7113.7190000154
9025.3670001402
18677
19614
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/145608-Idaptive-IDaaS-Buyers-Guide-EN-v1-440x264.jpg
h2
7113.8430000283
9004.9700001255
15276
16508
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/09/Frost-Sullivan-Assesment-BlackBerry-White-Paper-6-22-20-440x264.png
h2
7113.9450001065
8997.4030000158
112493
112157
200
image/png
Image
https://www.cybersecasia.net/wp-content/uploads/2020/09/spear-phishingv4-440x264.jpg
h2
7114.0360001009
9018.1929999962
25563
32166
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/08/2020_Sensitive-data-protection-in-the-retail-card-payments-ecosystem-440x264.jpg
h2
7114.2059999984
8995.7189999986
26281
26237
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/08/2020_Jun_A-Comprehensive-Guide-to-Authentication-Technologies-and-Methods-440x264.jpg
h2
7114.354000194
9020.5570000689
16627
17167
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/08/2020_Guide_to_Database_Encryption_guide_WP_A4_v2-440x264.jpg
h2
7114.4940000959
8276.4110001735
16589
17312
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/08/2020_JUN_CipherTrust-Manager-solution-brief-for-KMIP-Clients-440x264.jpg
h2
7114.6180001087
8506.4170002006
12384
13217
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/08/2020_Jan_ISARA-HSM-WP-v10-440x264.jpg
h2
7114.7440001369
9020.1820000075
18446
19104
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/08/BYLINE-CYBERSEC-copy11-440x264.jpg
h2
7114.8340001237
9019.2019999959
88049
87881
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/08/thumbnail_template-copy-440x264.jpg
h2
7114.9500000756
8996.5340001509
21331
21401
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/08/BeyondTrust_Whitepaper_The-Guide-to-Just-In-Time-Privileged-Access-Management-440x264.jpg
h2
7115.0609999895
9004.6740001999
22440
23232
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/08/BeyondTrust_Whitepaper_Quick-Guide-Enable-Secure-Your-Remote-Workforce-440x264.jpg
h2
7115.4040000401
8504.0600001812
29086
29063
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/07/Email-Security-Threat-Report-2020-440x264.jpg
h2
7115.5340000987
8731.443000026
15629
15897
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/07/Cyber-AI-for-SaaS-Security_-Protecting-Your-Dynamic-Workforce-440x264.jpg
h2
7115.6890001148
8732.3160001542
15988
16261
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/07/report_spear-phishing_thumbnail-440x264.jpg
h2
7115.8090000972
8506.1270000879
23091
23552
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/07/Barracuda-eBook_13-email-threats_may2020_thumbnail-440x264.jpg
h2
7115.9240000416
9020.8850000054
18392
18398
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/07/beuamer-Data-Protection-Global-Report-2019_thumbnails-440x264.jpg
h2
7116.0010001622
9005.661000032
25744
26054
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/07/apj-uda-holdings-case-study-440x264.jpg
h2
7116.1470001098
8962.0670001023
22437
22617
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/07/2020-SD-WAN-Report-Public-Cloud_thumbnail-440x264.jpg
h2
7116.2420001347
9021.4680000208
20785
20893
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/06/Whitepaper_BringingOrdertoChaoswithUES_Final-copy-440x264.jpg
h2
7116.3290000986
8730.9950001072
17384
17699
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/04/Skybox_Cloud_Trends_Report-images-440x264.jpg
h2
7116.5530001745
9024.2260000668
14428
14692
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/04/2020_VT_Trends-Report-reduced-images-440x264.jpg
h2
7116.7000001296
9004.2560000438
18252
18233
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/04/LogRhythm-Named-a-Leader-in-2020-Gartner-SIEM-Magic-Quadrant-440x264.jpg
h2
7116.8349999934
9005.353000015
13654
13926
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/04/The-LogRhythm-Security-Using-Security-Operations-Maturity-Model-440x264.jpg
h2
7116.9500001706
8307.5590000954
22308
22485
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/03/HOW-SMES-CAN-QUICKLY-AND-COST-EFFECTIVELY-DEPLOY-DEFENSES-AGAINST-CYBERTHREATS-440x264.jpg
h2
7117.0950001106
8730.2730001975
31616
31384
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/03/Worry-free-endpoint-protection-for-SMEs-bg-440x264.jpg
h2
7117.2520001419
9021.2030000985
9403
9498
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2019/11/How-to-protect-your-business-in-the-digital-economy-440x264.jpg
h2
7117.3610000405
8961.3130001817
122603
122381
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2019/11/cybercrimecon-440x264.jpg
h2
7117.4680001568
9228.6140001379
114634
114563
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Callsign+-+Rethink+your+SMS+Approach.jpg
http/1.1
7117.6050000358
10061.333000194
815810
815398
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/Accuity-Trade-Compliance-Survey-Infographic-60x60.jpg
h2
7117.7460001782
9230.1490001846
8877
15584
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/phishing+kity.jpg
http/1.1
7118.2300001383
11513.635999989
14776508
14776094
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/06/Guide-Thumbnail-1-60x60.jpg
h2
7118.3360000141
8731.2230002135
1902
1640
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/cyber-financial.jpg
http/1.1
7118.4340000618
10386.596000055
1138524
1138111
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/APT2-284x170.jpg
h2
7118.5160002206
9229.4680001214
20599
27317
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/04/myanmar2-60x60.jpg
h2
7118.6150000431
9228.1000001822
11332
15016
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/05/Screenshot-79-60x60.jpg
h2
7118.7380000483
9024.4630000088
1744
1486
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/01/Parly-1-60x60.jpg
h2
7118.8170001842
8501.3810000382
7258
7112
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/07/hybrid-workplace1111-284x170.jpg
h2
7118.9040001482
8275.9380000643
24057
30725
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/07/Unifying-vulnerability-and-patch-management-in-the-WFH-era-60x60.jpg
h2
7119.0170000773
9024.728000164
9328
13734
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/Filling-the-gaps-in-Asias-cyber-resilience-efforts2-60x60.jpg
h2
7119.1120001022
8731.7590001039
8546
12952
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/Knocking-down-barriers-for-a-cyber-secure-future-60x60.jpg
h2
7119.2210000008
9229.0390001144
8904
16570
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-top-5-remote-access-problems-60x60.jpg
h2
7119.3270001095
9025.1300001983
1949
1695
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/Role-of-biometrics-in-mitigating-security-risks-in-Asia-Pacific-60x60.jpg
h2
7119.4270001724
8535.8380000107
9530
17100
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/data-breaches-customer-60x60.png
h2
7119.5880000014
8503.2610001508
9242
8932
200
image/png
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-true-cost-of-free-60x60.jpg
h2
7119.681000011
8072.0110000111
2528
2253
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/bank2222-60x60.jpg
h2
7119.7930001654
8502.4930001236
10824
14368
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-new-CISO-mandate-protect-DevOps-60x60.jpg
h2
7119.8840001598
8072.5130001083
9237
13905
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Voting-banner-final.gif
http/1.1
7119.9930000585
10402.961000102
1784922
1784510
200
image/gif
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Homepage-DiamondSponsor-BT3.gif
http/1.1
7120.1580001507
10639.459000202
3113457
3113045
200
image/gif
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/hillstone-gold.gif
http/1.1
7120.2890002169
10586.934000021
3271111
3270699
200
image/gif
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/final-silver-synopsys.gif
http/1.1
7120.8490000572
10464.199000038
1586923
1586511
200
image/gif
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/claroty3.gif
http/1.1
7120.9650000092
10578.580000205
3302387
3301975
200
image/gif
Image
https://dgdwa0ulmobn4.cloudfront.net/wp-content/plugins/smart-slider-3/Public/SmartSlider3/Widget/Shadow/ShadowImage/Assets/shadow/dark.png
h2
7121.1780000012
7327.2460000589
10816
10576
200
image/png
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Quick+Link.png
http/1.1
7121.2680002209
9712.1040001512
118252
117841
200
image/png
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/2021/hybrid-workplace1111.jpg
http/1.1
7121.3510001544
10139.363000169
902355
901943
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/sparking.jpg
http/1.1
7121.444000164
9730.5670001078
148102
147690
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Government+agency+escapes+a+cyberattack+while+trialing+an+AI+security+solution.jpg
http/1.1
7121.5290001128
10340.481000021
1295834
1295421
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/03/widget-homepage3.png
h2
7121.64700008
8728.8670002017
43647
43677
200
image/png
Image
https://www.cybersecasia.net/wp-content/uploads/2020/09/spear-phishingv4-45x45.jpg
h2
7121.7420001049
8729.2550001293
7606
12732
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/07/report_spear-phishing_thumbnail-45x45.jpg
h2
7121.8380001374
8962.4170002062
1229
1066
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/07/Barracuda-eBook_13-email-threats_may2020_thumbnail-45x45.jpg
h2
7121.9440000132
8961.7350001354
1289
1116
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_QuickGuide_2020_EnableSecureYourRemoteWorkforce-60x80.jpg
h2
7122.0560001675
8728.3300000709
11869
15425
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_Zero_Trust_Secure_Remote_Access_wp-60x80.jpg
h2
7122.2000000998
8963.3690000046
10417
14052
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/thumbnail-m1-80x60.jpg
h2
7122.3010001704
8307.1240000427
2542
2270
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/Thumbnail-srei-80x60.jpg
h2
7124.2580001708
8536.4580000751
1654
1397
200
image/jpeg
Image
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/CYBERSECasia.fw.png
http/1.1
7124.3879999965
9938.4390001651
297456
297045
200
image/png
Image
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/MartechAsia/Featured+Images/2021/TLM-logo.svg
http/1.1
7124.5990002062
9220.9930000827
20699
20285
200
image/svg+xml
Image
https://www.googletagmanager.com/gtag/js?id=UA-145136419-1
h2
7124.6990000363
7169.0260001924
40029
98968
200
application/javascript
Script
https://sdki.truepush.com/sdk/v2.0.2/app.js
h2
7124.8400001787
7228.4550000913
1083
1126
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/add-search-to-menu/public/css/ivory-ajax-search.min.css?ver=4.6.6
h2
7045.9930000361
7280.4450001568
2418
8143
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/popups-for-divi/scripts/front.min.js?ver=3.0.3
h2
7079.6750001609
7311.22100004
21586
66327
200
application/javascript
Script
https://www.cybersecasia.net/wp-includes/js/masonry.min.js?ver=4.2.2
h2
7090.234000003
7315.8880001865
7673
24138
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/themes/Extra/scripts/scripts.min.js?ver=4.10.8
h2
7090.5040001962
7764.5630000625
79702
296983
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/themes/Extra/core/admin/js/es6-promise.auto.min.js?ver=4.10.8
h2
7090.7250000164
7331.2060001772
2976
6817
200
application/javascript
Script
https://www.google.com/recaptcha/api.js?render=6LcOQLAUAAAAAJE6aHUcEpbVmTsNus99g_88TITd&ver=4.10.8
h2
7090.9730000421
7106.6730001476
1140
884
200
text/javascript
Script
https://www.cybersecasia.net/wp-content/themes/Extra/core/admin/js/recaptcha.js?ver=4.10.8
h2
7091.3070000242
7759.0990001336
1006
1696
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/themes/Extra/includes/builder/feature/dynamic-assets/assets/js/jquery.fitvids.js?ver=4.10.8
h2
7091.6000001598
7759.4720001798
1635
3349
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/supreme-modules-for-divi/scripts/frontend-bundle.min.js?ver=2.4.0
h2
7091.7570001911
7331.9459999911
2858
7338
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/themes/Extra/core/admin/js/common.js?ver=4.10.8
h2
7092.1070000622
7765.3710001614
860
1343
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/carousel-slider/assets/lib/select2/select2.min.js?ver=4.0.5
h2
7092.2600000631
7335.1090000942
19258
66606
200
application/javascript
Script
https://www.cybersecasia.net/wp-includes/js/underscore.min.js?ver=1.13.1
h2
7092.5700000953
7331.7040000111
7602
19076
200
application/javascript
Script
https://www.cybersecasia.net/wp-includes/js/wp-util.min.js?ver=5.8.1
h2
7092.7330001723
7760.2880001068
999
1340
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-crop.min.js?ver=2.2.5
h2
7092.9020000622
7332.691000076
5833
17151
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-modal.min.js?ver=2.2.5
h2
7093.1450000498
7331.4560002182
1524
5284
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-jquery-form.min.js?ver=2.2.5
h2
7093.2570002042
7332.3810000438
5848
14763
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-fileupload.js?ver=2.2.5
h2
7093.4690001886
7759.9970002193
3705
9808
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/pickadate/picker.js?ver=2.2.5
h2
7093.9010002185
7336.2420001067
9608
39643
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/pickadate/picker.date.js?ver=2.2.5
h2
7094.1480000038
7339.9879999924
10882
49595
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/pickadate/picker.time.js?ver=2.2.5
h2
7094.3140001036
7340.5100000091
7961
32991
200
application/javascript
Script
https://www.cybersecasia.net/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.7
h2
7094.5730002131
7765.1700000279
2690
6406
200
application/javascript
Script
https://www.cybersecasia.net/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=3.15.0
h2
7094.6810001042
7340.9190000966
6297
16470
200
application/javascript
Script
https://www.cybersecasia.net/wp-includes/js/dist/hooks.min.js?ver=a7edae857aab69d69fa10d5aef23a5de
h2
7094.813000178
7341.2770000286
2085
5440
200
application/javascript
Script
https://www.cybersecasia.net/wp-includes/js/dist/i18n.min.js?ver=5f1269854226b4dd90450db411a12b79
h2
7094.9400002137
7340.2570001781
4150
9866
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-raty.min.js?ver=2.2.5
h2
7095.1790001709
7339.2300000414
3309
9186
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-tipsy.min.js?ver=2.2.5
h2
7095.4790001269
7341.9240000658
1892
4405
200
application/javascript
Script
https://www.cybersecasia.net/wp-includes/js/jquery/jquery.masonry.min.js?ver=3.1.2b
h2
7095.6960001495
7339.6460001823
1010
1819
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/simplebar.min.js?ver=2.2.5
h2
7095.82100017
7761.4340002183
13591
45197
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-functions.min.js?ver=2.2.5
h2
7095.9690001328
7345.0110000558
3943
14917
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-responsive.min.js?ver=2.2.5
h2
7096.1029999889
7344.3210001569
508
221
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-conditional.min.js?ver=2.2.5
h2
7096.2410001084
7344.6270001587
2648
9787
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-scripts.min.js?ver=2.2.5
h2
7096.3840000331
7341.6930001695
3603
12399
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-profile.min.js?ver=2.2.5
h2
7096.521000145
8042.190000182
1246
2783
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-account.min.js?ver=2.2.5
h2
7096.8960002065
7342.7620001603
1041
2771
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/add-search-to-menu/public/js/ivory-search.min.js?ver=4.6.6
h2
7097.3120001145
7342.1620000154
1502
4522
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/featured-image-from-url/includes/html/js/image.js?ver=3.7.4
h2
7097.4189999979
7761.6420001723
924
2271
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/add-search-to-menu/public/js/ivory-ajax-search.min.js?ver=4.6.6
h2
7097.5109999999
7537.3100000434
20562
67533
200
application/javascript
Script
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__en.js
h2
7124.9430000316
7137.2070000507
136081
347292
200
text/javascript
Script
https://www.cybersecasia.net/wp-content/themes/Extra/style.css
h2
6607.4040001258
7014.9940000847
547
273
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/themes/Extra/fonts/ET-Extra.woff
h2
7130.111000035
8535.337000154
14665
14428
200
font/woff
Font
https://www.cybersecasia.net/wp-content/uploads/2021/09/Data-protection-in-the-hybrid-work-environment-1200x640.jpg
h2
7154.3110001367
8956.6520000808
98832
105718
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/pegasus-spyware-final-1280x640.jpg
h2
7155.1860000473
9185.4140001815
110351
117803
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Dealing-with-the-industrialization-of-fraud-and-scams1-1200x640.jpg
h2
7155.5870000739
8960.5260000098
76677
83602
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Protecting-identities-and-access-in-the-age-of-digital-banking1-1200x640.jpg
h2
7155.9560000896
9187.49700021
66906
78008
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Automating-security-for-the-digital-economy-1200x640.jpg
h2
7156.4160000999
8767.6620001439
78720
87076
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/The-future-of-digital-identities-and-digital-trust-1200x640.jpg
h2
7156.6710001789
8963.6870000977
80983
91194
200
image/jpeg
Image
data
7184.623000212
7184.7250000574
0
356
200
image/svg+xml
Image
data
7186.1160001718
7186.1860000063
0
184
200
image/svg+xml
Image
data
7188.6170001235
7188.7950000819
0
604
200
image/svg+xml
Image
data
7190.2920000721
7190.3910001274
0
568
200
image/svg+xml
Image
data
7191.4490000345
7191.529000178
0
73
200
image/svg+xml
Image
https://dgdwa0ulmobn4.cloudfront.net/wp-content/uploads/2021/03/bt-v3.jpg
h2
7201.8910001498
9103.6920000333
857563
865944
200
image/jpeg
Image
https://dgdwa0ulmobn4.cloudfront.net/wp-content/uploads/2020/10/Slider_welcome_player.jpg
h2
7202.2650002036
9281.2400001567
574816
593075
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/Slider_welcome_player.jpg
h2
7202.7630000375
9190.566000063
574586
593075
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Rubrik-socmed.jpg
http/1.1
7202.9980001971
10295.633000089
635871
635459
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/06/micro-virty-1280x640.jpg
h2
7206.8430001382
9001.0240001138
97317
107057
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/04/image_2021_04_22T03_12_15_226Z-1280x640.jpg
h2
7207.2690001223
9191.6050000582
62054
63529
200
image/jpeg
Image
data
7243.4750001412
7243.5450002085
0
72
200
image/svg+xml
Image
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021092001.js?31062913
h2
7262.285000179
7275.0640001614
121104
343839
200
text/javascript
Script
https://securepubads.g.doubleclick.net/pagead/ppub_config?ippd=www.cybersecasia.net
h2
7264.277000213
7270.8000000566
1053
80
200
application/json
XHR
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/beyondtrust-diamond.gif
http/1.1
7286.6490001325
10826.000000117
2911974
2911562
200
image/gif
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/banking-fraud.jpg
http/1.1
7318.19000002
12131.502000149
990248
989836
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/cs_kyocera.jpg
http/1.1
7319.0090002026
10356.967000058
530619
530207
200
image/jpeg
Image
https://api.popin.cc/searchbox/cybersecasia.js
http/1.1
7320.4140001908
8444.7490000166
42685
193603
200
text/javascript
Script
https://marketinghub.zoho.com/hub/js/WebsiteAutomation.js
http/1.1
7334.1880000662
7926.4400000684
332
0
301
text/html
https://www.cybersecasia.net/wp-includes/css/dist/block-library/style.min.css?ver=5.8.1
h2
7336.7890000809
7987.4140000902
10714
80574
200
text/css
Stylesheet
https://fonts.gstatic.com/s/roboto/v29/KFOmCnqEu92Fr1Mu7GxK.woff2
h2
7355.285000056
7359.4810001086
23343
22376
200
font/woff2
Font
https://fonts.gstatic.com/s/roboto/v29/KFOlCnqEu92Fr1MmWUlfChc4.woff2
h2
7407.9120000824
7410.7850000728
23530
22564
200
font/woff2
Font
https://fonts.gstatic.com/s/roboto/v29/KFOlCnqEu92Fr1MmEU9fChc4.woff2
h2
7408.1180000212
7411.6190001369
23513
22548
200
font/woff2
Font
https://fonts.gstatic.com/s/roboto/v29/KFOlCnqEu92Fr1MmSU5fChc4.woff2
h2
7419.1540000029
7424.0610001143
23403
22436
200
font/woff2
Font
https://sdki.truepush.com/sdk/version.json
h2
7443.4710000642
7541.5420001373
713
176
200
application/json
XHR
https://adservice.google.com/adsid/integrator.js?domain=www.cybersecasia.net
h2
7537.1540000197
7543.3790001553
723
107
200
application/javascript
Script
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3514731079085570&correlator=2993420729247312&output=ldjh&impl=fif&eid=31060978%2C31062913%2C21068031&vrg=2021092001&ptt=17&sc=1&sfv=1-0-38&ecs=20210927&iu_parts=21849235607%2Cg27rlm3u5m&enc_prev_ius=%2F0%2F1&prev_iu_szs=970x90%7C1x1&cookie_enabled=1&bc=31&abxe=1&lmt=1632706611&dt=1632706611260&dlt=1632706609338&idt=1799&frm=20&biw=1350&bih=940&oid=3&adxs=190&adys=152&adks=2987574385&ucis=1&ifi=1&u_his=2&u_h=600&u_w=800&u_ah=600&u_aw=800&u_cd=24&u_sd=1&u_tz=-420&flash=0&url=https%3A%2F%2Fwww.cybersecasia.net%2F&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1296x0&msz=1296x0&ga_vid=1844410173.1632706611&ga_sid=1632706611&ga_hid=212376847&ga_fc=false&fws=4&ohw=1296&btvi=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCxudWxsXQ..
h2
7614.3430001102
7657.6270000078
15723
37062
200
text/plain
XHR
https://ea995888f8ab88013655264b1ae7ea5b.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
h2
7619.294000091
7630.6230002083
3958
6094
200
text/html
Document
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3514731079085570&correlator=2993420729247312&output=ldjh&impl=fif&eid=31060978%2C31062913%2C21068031&vrg=2021092001&ptt=17&sc=1&sfv=1-0-38&ecs=20210927&iu_parts=21849235607%2CoOuEGkMO0b&enc_prev_ius=%2F0%2F1&prev_iu_szs=728x90%7C1x1&cookie_enabled=1&bc=31&abxe=1&lmt=1632706611&dt=1632706611270&dlt=1632706609338&idt=1799&frm=20&biw=1350&bih=940&oid=3&adxs=27&adys=189&adks=525574821&ucis=2&ifi=2&u_his=2&u_h=600&u_w=800&u_ah=600&u_aw=800&u_cd=24&u_sd=1&u_tz=-420&flash=0&url=https%3A%2F%2Fwww.cybersecasia.net%2F&vis=1&dmc=8&scr_x=0&scr_y=0&psz=938x0&msz=938x0&ga_vid=1844410173.1632706611&ga_sid=1632706611&ga_hid=212376847&ga_fc=false&fws=0&ohw=0&btvi=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCxudWxsXQ..
h2
7619.9420001358
7661.4850000478
15728
37059
200
text/plain
XHR
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3514731079085570&correlator=2993420729247312&output=ldjh&impl=fif&eid=31060978%2C31062913%2C21068031&vrg=2021092001&ptt=17&sc=1&sfv=1-0-38&ecs=20210927&iu_parts=21849235607%2C3nqwr85Ze4&enc_prev_ius=%2F0%2F1&prev_iu_szs=342x192%7C1x1&cookie_enabled=1&bc=31&abxe=1&lmt=1632706611&dt=1632706611273&dlt=1632706609338&idt=1799&frm=20&biw=1350&bih=940&oid=3&adxs=-12245933&adys=-12245933&adks=4048702381&ucis=3&ifi=3&u_his=2&u_h=600&u_w=800&u_ah=600&u_aw=800&u_cd=24&u_sd=1&u_tz=-420&flash=0&url=https%3A%2F%2Fwww.cybersecasia.net%2F&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x0&msz=0x0&ga_vid=1844410173.1632706611&ga_sid=1632706611&ga_hid=212376847&ga_fc=false&fws=132&ohw=1296&btvi=-1&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCxudWxsXQ..
h2
7620.2550001908
7672.3680000287
9597
19467
200
text/plain
XHR
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3514731079085570&correlator=2993420729247312&output=ldjh&impl=fif&eid=31060978%2C31062913%2C21068031&vrg=2021092001&ptt=17&sc=1&sfv=1-0-38&ecs=20210927&iu_parts=21849235607%2Cdh8zvdelym&enc_prev_ius=%2F0%2F1&prev_iu_szs=300x250%7C1x1&cookie_enabled=1&bc=31&abxe=1&lmt=1632706611&dt=1632706611279&dlt=1632706609338&idt=1799&frm=20&biw=1350&bih=940&oid=3&adxs=1004&adys=429&adks=951038268&ucis=4&ifi=4&u_his=2&u_h=600&u_w=800&u_ah=600&u_aw=800&u_cd=24&u_sd=1&u_tz=-420&flash=0&url=https%3A%2F%2Fwww.cybersecasia.net%2F&vis=1&dmc=8&scr_x=0&scr_y=0&psz=337x0&msz=337x0&ga_vid=1844410173.1632706611&ga_sid=1632706611&ga_hid=212376847&ga_fc=false&fws=4&ohw=337&btvi=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCxudWxsXQ..
h2
7620.473000221
7664.1379999928
15438
37075
200
text/plain
XHR
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3514731079085570&correlator=2993420729247312&output=ldjh&impl=fif&eid=31060978%2C31062913%2C21068031&vrg=2021092001&ptt=17&sc=1&sfv=1-0-38&ecs=20210927&iu_parts=21849235607%2CwCvAivJMwm&enc_prev_ius=%2F0%2F1&prev_iu_szs=300x250%7C1x1&cookie_enabled=1&bc=31&abxe=1&lmt=1632706611&dt=1632706611282&dlt=1632706609338&idt=1799&frm=20&biw=1350&bih=940&oid=3&adxs=1004&adys=843&adks=593995196&ucis=5&ifi=5&u_his=2&u_h=600&u_w=800&u_ah=600&u_aw=800&u_cd=24&u_sd=1&u_tz=-420&flash=0&url=https%3A%2F%2Fwww.cybersecasia.net%2F&vis=1&dmc=8&scr_x=0&scr_y=0&psz=337x0&msz=337x0&ga_vid=1844410173.1632706611&ga_sid=1632706611&ga_hid=212376847&ga_fc=false&fws=4&ohw=337&btvi=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCxudWxsXQ..
h2
7620.5560001545
7671.2290002033
15535
37236
200
text/plain
XHR
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3514731079085570&correlator=2993420729247312&output=ldjh&impl=fif&eid=31060978%2C31062913%2C21068031&vrg=2021092001&ptt=17&sc=1&sfv=1-0-38&ecs=20210927&iu_parts=21849235607%2Cwa893eb31g&enc_prev_ius=%2F0%2F1&prev_iu_szs=300x600%7C1x1&cookie_enabled=1&bc=31&abxe=1&lmt=1632706611&dt=1632706611291&dlt=1632706609338&idt=1799&frm=20&biw=1350&bih=940&oid=3&adxs=1004&adys=2269&adks=4197158213&ucis=6&ifi=6&u_his=2&u_h=600&u_w=800&u_ah=600&u_aw=800&u_cd=24&u_sd=1&u_tz=-420&flash=0&url=https%3A%2F%2Fwww.cybersecasia.net%2F&vis=1&dmc=8&scr_x=0&scr_y=0&psz=337x0&msz=337x0&ga_vid=1844410173.1632706611&ga_sid=1632706611&ga_hid=212376847&ga_fc=false&fws=4&ohw=337&btvi=1&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCxudWxsXQ..
h2
7620.9910002071
7666.44800012
15422
37044
200
text/plain
XHR
https://www.google-analytics.com/analytics.js
h2
7645.3090000432
7650.9580002166
20399
49529
200
text/javascript
Script
https://sdki.truepush.com/sdk/v2.0.3/main.js
h2
7647.741000168
7682.489000028
19234
81130
200
application/javascript
Script
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstFZCYJztVF4jSxELZa_NAajExlThUhc9q0-jN8kzy7Zi2PnJ-_OpOHtOO2CeKmzmXo684IE4YhWL5eNViyn8Nya5bx23NB5LiDVKaC6ZJWXgSMJ9Bnpp773d4f-GltDP3GCe2_WgafMWF2NL-kywfQTSVcmL_lJYJAP3CcwNHi5Lm5bf3n25HWMopaj9C2zFcR1rekBMGbwiYplWyvDwRlYGrz7qg6tHjH8iqglJrXwEVfGS7B9KVSGJXsAphYBxSQM9EEsDUS9cZAIH6n26U_WceOuGf6SHzQCppgVXb5PibZk4uA8ZlRIEkjTQ&sai=AMfl-YTBwO1ojvpaN6He48B4yIO44JIhuMjK1BlcYOEagU1Z3X9Tdy4boy5IBnUOOEaa3yoKSpKe5A5HxfEHRa3boNU8AaURLFTnJi5wdptFoBBTz5sE6P5oHuTGp_gsZbw&sig=Cg0ArKJSzE5jfc9GhEnvEAE&adurl=
h2
7721.2060000747
7954.2830002028
1174
0
200
image/gif
Fetch
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/abg_lite_fy2019.js
h2
7722.6120000705
7725.8700001985
8438
18724
200
text/javascript
Script
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/client/window_focus_fy2019.js
h2
7723.0150001124
7726.2300001457
2161
2617
200
text/javascript
Script
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
h2
7723.3710000291
7733.7300002109
40621
131328
200
text/javascript
Script
https://tpc.googlesyndication.com/simgad/3910865140753897887
h2
7724.203000078
7793.1610001251
53295
52419
200
image/jpeg
Image
https://www.googletagservices.com/activeview/js/current/osd.js
h2
7728.1550001353
7735.4770000093
28611
73832
200
text/javascript
Script
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuloBwe7OJ_NNJI4-bjpa4HX8AU4hn_g-vBFbha3qYxxiyWdXORL0lGykUmf6HLs__MLKOvtqvSNl7xz7jwpefVbJYydkTG33WqjCCRrlLpVjZq5CPafGqeLERiTAHW7vegTUbXx7CzfD839jQJcvRDle2W9EfV7sFzghkEFnWcIKJfSXsVOfSSG0E4HIrEbVM1eX6sxOvB9nhvz2-idJGUitdqQg-t6WVr2Cak0YHVMzVOQ4SMvyZ0kYFngWTl83Ums-dfkeXtW3V-sJbyIbYv8jxaDxQp6k1WgMcL6rZpQwFAJCOP7jqiz3nQVg&sai=AMfl-YRgcc4_-veTpkxxd7HAOccJPWJMlVrYC3ho_aAEOp6nNnFxd07FUkJbKTwEbt1IaUtKeB2Op5lu4NSylZoWAC3kdhhwn8FuYroJ5lozclZhtKxgSBPAwDpAL--BZIxO&sig=Cg0ArKJSzHV-mFh6DAMYEAE&adurl=
h2
7754.695000127
7965.01000016
813
0
200
image/gif
Fetch
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/abg_lite_fy2019.js
h2
7756.0710001271
7760.6210000813
8438
18724
200
text/javascript
Script
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/client/window_focus_fy2019.js
h2
7756.4509999938
7759.7720001359
2161
2617
200
text/javascript
Script
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
h2
7756.8370001391
7769.5620001759
40621
131328
200
text/javascript
Script
https://tpc.googlesyndication.com/simgad/12464120707616165329
h2
7757.5209999923
7819.211000111
193839
192963
200
image/gif
Image
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuI52KOAknnrqQrOzc6Yg2M58IWCn6alh2sIBhYAuXuvfBYqrczpDBpUSjwKJAf7uYjzR7Cye79o-zakdq3GU_bYSVCnbT7Tnln_mUbmP0gNLEETY1q-JUoMkmzZ5IR8eHR3CAd9jACIP7SyZ-i9u17e9_JzJqMD0bRDWWofF6OgHjjEMdPrO2wE41NR1o-IKggF5y2d9jkdTvuwMEfQv8wl-cCJvM8VqZSa8F-dCK_UlvP1KJ20mz50dzjnFcyCToMBX7hUHWPOekBbEDrqaw-xu0QaWI0VXGeG2mi1O4bRTUdL8_cqw9f-3xS_A&sai=AMfl-YRelfsecmagMobt2xEh5Wn4dMxWXQLmd2ZuUECP3iiO_zBYhWHoV7497Yp-XU_wWzcaDAK6a1_5wyW8zm9AdIFFW9O2vzDlFn4UYFkeTf8GWAoZ7-w7Q87LYzoO00A&sig=Cg0ArKJSzKzszsBqr3jdEAE&adurl=
h2
7784.558000043
8024.9550000299
813
0
200
image/gif
Fetch
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/abg_lite_fy2019.js
h2
7785.6670001056
7794.543000171
8438
18724
200
text/javascript
Script
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/client/window_focus_fy2019.js
h2
7786.0499999952
7788.532000035
2161
2617
200
text/javascript
Script
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
h2
7786.3570000045
7793.8140002079
40621
131328
200
text/javascript
Script
https://tpc.googlesyndication.com/simgad/394538675616936512
h2
7786.9669999927
7959.6020001918
42869
41993
200
image/jpeg
Image
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvg2e7X9R1S79iISDg1jVj8ZnPt-afGzY0UbRX3kf9vikYKZSLegfLUJYq6q_C77TV4mCj4gYrwebcecxoVGvpzEb0kbX6f6Ul3Z7qjyXBSPhnfrDScqkixiw1Qs0TGOYvZg7GWJ7k2oWujQ3cgGDri2aExe9afFPgva2jdQ9uynFiZYa0imPsd5tq3-8GtzTXd9l8ylBqDqhe-2Wnl9NfE1znzYoqyOXg5nGfDvwMvIhdPf71Uv2bj7KvMiP_Ar1SZXsJJ_nVCsRQHzp9_5HIk8KQnDlbuteITi-F2mEykDqWfvDsT_cqYG9TJPQ&sai=AMfl-YT4GSg5gz1eovH3vPFZPS8y12HgcikG3utfWa_csMVeOj9sKJwGtBmSOTM3SyPaQXafjHglRh5IvFTrUCQL8e0ITUNL9KGKnOjsoHgknf6w1ZX5keqU0ZUlsYQLgAQ&sig=Cg0ArKJSzC8-EotBSOrVEAE&adurl=
h2
7823.2980000321
8030.3140000906
813
0
200
image/gif
Fetch
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/abg_lite_fy2019.js
h2
7824.6640001889
7827.9820000753
8438
18724
200
text/javascript
Script
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/client/window_focus_fy2019.js
h2
7825.1480001491
7831.3520001248
2161
2617
200
text/javascript
Script
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
h2
7825.5570000038
7832.648999989
40621
131328
200
text/javascript
Script
https://tpc.googlesyndication.com/simgad/14484253394520513115
h2
7826.0730002075
7973.3600001782
673793
672917
200
image/gif
Image
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssCV3ks7CFjJVWcb5dz-OdzedxjdtucRNihSxHryFpRMoXiTiIc2zlMELwRwzUYNa9Vdf3pftzPQpBTpUALNAFzCX1jIlMs4SkpAp8wL50Q41EniI96mUd69E8CjVGCs3MRh2X2h1KMm-Cd3OCY_6alg2XJDpd1y9JTGQCfoyiGvy94EdWcheS0CbmbivXPCanbvHhCIfB4aqMDW6LAm4EDw02SQShdg8rk14dpp7KcTQMgRgR6f9j8Kv_Ie8N2wzESb927KGfUssh0ol8Ln0OZD6K4TgTuRzSAZ-Sby9nsMK3wzXyRoS_FhHwz-A&sai=AMfl-YTJdWR8D4ViDIuSACnEzcnD34pwXo0cuOCn1oAsuZe8XXWLOvMBsMztE-DfLgKz9r98RbgQpbg4JGuXQwXqv20UVNtZ7nQksmsuBRFbAFvKLvsEdWcuwlx1L_SjMlA&sig=Cg0ArKJSzNbvmhdVpBPbEAE&adurl=
h2
7851.353000151
8193.016000092
813
0
200
image/gif
Fetch
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/abg_lite_fy2019.js
h2
7852.824000176
7877.8600001242
8438
18724
200
text/javascript
Script
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/client/window_focus_fy2019.js
h2
7853.1730000395
7855.6660001632
2161
2617
200
text/javascript
Script
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
h2
7853.6070000846
7862.1450001374
40621
131328
200
text/javascript
Script
https://www.google.com/ads/measurement/l?ebcid=ALh7CaSw-iGQr3jX2EzjzuvZcGBdCH6Mx1qVlkdpFbA0dxRiFp1ixTbUEBbNrYUw3dG__kcwifj0vcCrXfpj7FO-P19hcg2IgA
h2
7854.0090001188
7858.3420000505
406
0
204
text/html
Image
https://tpc.googlesyndication.com/simgad/5117745255250607278
h2
7854.6800001059
7930.6040001102
324465
323589
200
image/gif
Image
https://ea995888f8ab88013655264b1ae7ea5b.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
h2
7889.0910001937
7899.2600000929
3958
6094
200
text/html
Document
https://ma.zoho.com/hub/js/WebsiteAutomation.js
http/1.1
7927.5110000744
8252.8700002003
9336
36879
200
application/javascript
Script
https://www.google-analytics.com/j/collect?v=1&_v=j93&a=212376847&t=pageview&_s=1&dl=https%3A%2F%2Fwww.cybersecasia.net%2F&ul=en-us&de=UTF-8&dt=CybersecAsia%20%7C%20Asia%27s%20most%20trusted%20enterprise%20cybersecurity%20information%20portal&sd=24-bit&sr=800x600&vp=1350x940&je=0&_u=YAhAAUABAAAAAC~&jid=618822776&gjid=150596512&cid=1844410173.1632706611&tid=UA-145136419-1&_gid=1924785970.1632706612&_r=1&gtm=2ou9m0&z=1644691388
h2
7949.8340000864
7955.1410002168
646
2
200
text/plain
XHR
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjss0wfCKpeFs3ku6UppjGN6stsuoi66FlNFdEz34kVN6P0dbYxrptMUQX34sZk6mJz5iAU5i7lZk00t8fyUagj-JXEf3N9jGrGo5Jr98wBz-GjnHtWtgl6Abc5jTLYAocYErbgC77vi7h8iIYQnR0tnvgZAPy_RKZoTjc_KykTGHjK_IbkDT0aBnGn38QSAPR3jC5tRVpSZs-isXDCR4yJLN2qMFVqBGrwnUuqKiN2ZISGj0QPhEYADcesa63rcLI90HoE9C2BrvpaKpQjXjU5rxbqVTfA3CEESL6YAgpe-dGmBW30uPLS5O_Hgd5Esx&sai=AMfl-YQ3ubhoFqtoNV6DIBxiEIyCshDql-edzwaazPBdCZ1J0Dzhir7kRAO8oBCMOHqPDMyR8b1yoINVKSOoIVwOX2BhJbg7ltAzycA2OkY_LVfZJEocbL_3DRN4ti2fZlc&sig=Cg0ArKJSzOFkup1nF6sqEAE&adurl=
h2
8010.9410001896
8515.1450000703
1002
0
200
image/gif
Fetch
data
8016.467000125
8016.5490000509
0
209
200
image/png
Image
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvQ3AWJFjEittaIa2KhMxSv81JKNE3tjx8YQXNHP2OW6Y_x7o4J8efh87MJSVKdaOI-h8KdjSj_-lNbJv0GvJmcId5x-nrheJYWC-Y68tWM7ate3I8q9G0XpJ_KPog9Soys9h8_nLjmiz-L7HgJip-BcTmEG7Ci6fVAS46jT2eSNbqZ26IJTMX9CYArdo-kzL19vTm6QMgxnu99-4BNn88yQtIDv7EwrIUKYWQ7-Hgwag8nVdMIBP7VfppC2oWbGKiboHhPstKyQJkPHj6OWUCJlFNCe0HF8p37ouqxNFLJZHUHxUCldOEkH9UHA1SR&sai=AMfl-YSCPaRGivBTdCLYmcFtLQlTEB5Rx1yqHqm6cbwTuy97vj5GO-vx-Of3amIDF8w3CALwhe6ROe1u-WtPuEU3ZqnZ7QIYnoIKXBslbaFt1g6a-Q2GjW2Sy31JtvTEhBgO&sig=Cg0ArKJSzKbOgfglAGEMEAE&adurl=
h2
8188.8550000731
8600.640000077
1002
0
200
image/gif
Fetch
data
8191.6440001223
8191.7860000394
0
211
200
image/png
Image
data
8251.5560002066
8251.6890000552
0
217
200
image/png
Image
data
8298.917000182
8298.9890000317
0
209
200
image/png
Image
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuzqsMiyWLsI0aK7un34oe1sm6HpLXOi6vh_ncrl49dYbtg0XWk2nJ6QGia6eFrUWnU_ypCy8h8rNO_hVdOOqlpeMmAyxmtUd4yG4xRIVYPbAt-WRfu8RA-YGdrSA-YJ6cMrergCBNRptPiWvJvUzCjcDMhhOq5lt_NDMw_71I-WVB8a7Kom0JiKi9TiZPYN5LKGIY8SYh8UBf6Ro5b41a_RqyvyN1M9fOxFI9zmQc21Itx2qnXdoGvC_qDZTQKW5y0dzKSdSOps2UC6XkuY3RWeeCSCjSNl0IAjyztfY1YjMTKsza-yGrBT6KmrJQK&sai=AMfl-YTGzkNKTaPZIyHUZMwbRa8c3_kXh5rX2C9VHYe3vxyvqvNibrmgMrHb18kaND0KoFhQcnavJds-kEyGvj48GSBE3Q-gcNSfjE2xo9uPeIglVef2jpAh-harn10QY20&sig=Cg0ArKJSzEj_KzfRXeh2EAE&adurl=
h2
8346.2770001497
8603.8920001592
1002
0
200
image/gif
Fetch
data
8350.8930001408
8350.998000009
0
212
200
image/png
Image
https://sdk.truepush.com/api/v2/truepushSDKPlatfromDetails
http/1.1
10681.053000037
12999.692000216
1926
1398
200
application/json
XHR
https://sdk.truepush.com/api/v2/truepushSDKPlatfromDetails
http/1.1
8361.225000117
10680.539000081
403
0
204
Preflight
https://stats.g.doubleclick.net/j/collect?t=dc&aip=1&_r=3&v=1&_v=j93&tid=UA-145136419-1&cid=1844410173.1632706611&jid=618822776&gjid=150596512&_gid=1924785970.1632706612&_u=YAhAAUAAAAAAAC~&z=1775919499
h2
8367.8120002151
8371.9109999947
718
1
200
text/plain
XHR
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvIQ-hMYUuHStAi6F-MaWsU6QVhLKJKEIYBmDhZ6yoZDih5puxK2Y7S-lTn0onlOIzf4B6w06eLIL0FA1gYuW2Oz-zflrTdJtwsCgrOLS-NTjnxg1NZlOkFN5g-wTLIYmmd_865DvnCmL65TV5aRESvzLAqqAfnL7mJ5p9n-7ZvIx6k21KwtNh8U_msmLnkXrWgwsV7JTp0aWN5Wdks_sgY2EyOF572VsGmyVBGLSgLE-gd6qAlOrd4tPHgcnLkCRdxP0w6_v7AIwkDrbx-dexWVTExDt4cwiooshxiHzVSSlNpT7O9b9f9pMf6R3eQ&sai=AMfl-YTA69dYN0K72vx2EH6pD6FlkX_de8LuFSh-QBjzlbYhuZGycs845KwdflViW2BT7F6N5OuiNSNPBBiUn8BCkPtYdmY74mVIrXUQrOUdbBkvNPN-ef4QAKl_DqqRzak&sig=Cg0ArKJSzBb_aFq_iHNTEAE&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCxudWxsXQ%3D%3D&adurl=
h2
8499.4530000258
9497.197000077
1002
0
200
image/gif
Fetch
https://fonts.gstatic.com/s/roboto/v29/KFOlCnqEu92Fr1MmYUtfChc4.woff2
h2
8553.8020001259
8557.7500001527
23395
22428
200
font/woff2
Font
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LcOQLAUAAAAAJE6aHUcEpbVmTsNus99g_88TITd&co=aHR0cHM6Ly93d3cuY3liZXJzZWNhc2lhLm5ldDo0NDM.&hl=en&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=ywf7o69k5ble
h2
8574.9430002179
8600.3640000708
20688
39425
200
text/html
Document
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LcOQLAUAAAAAJE6aHUcEpbVmTsNus99g_88TITd&co=aHR0cHM6Ly93d3cuY3liZXJzZWNhc2lhLm5ldDo0NDM.&hl=en&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=sgfduhsdlllv
h2
8581.0690000653
8603.3530000132
20778
39551
200
text/html
Document
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/abg_lite_fy2019.js
h2
8620.210000081
8626.984000206
8438
18724
200
text/javascript
Script
https://tpc.googlesyndication.com/safeframe/1-0-38/js/ext.js
h2
8620.5830001272
8626.3640001416
23854
23011
200
text/javascript
Script
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
h2
8620.9929999895
8627.5970002171
40621
131328
200
text/javascript
Script
https://www.cybersecasia.net/wp-content/themes/Extra/core/admin/fonts/modules/all/modules.ttf
h2
8849.7290001251
9261.2590000499
92637
92400
200
font/ttf
Font
https://maillist-manage.com/wa/ActionLogger?callback=processData&webAutoId=27218d28c96aa859e529e5bdf4a9ccfb6&zuid=2ac5d97184e3b631c6a73058460b2a736&domain=2a8d665163b105b383759cab4da946a376a73058460b2a736&orgDomainId=2ea4fb3d57d695ac93527561a82ffdb4140fbf6cd35f5c50c&reqType=0&ref=&socialshare=null&value=CybersecAsia%20%7C%20Asia%27s%20most%20trusted%20enterprise%20cybersecurity%20information%20portal&action=viewed&url=https%3A%2F%2Fwww.cybersecasia.net%2F&parentUrl=https%3A%2F%2Fwww.cybersecasia.net%2F
http/1.1
9230.0629999954
9860.5260001495
2182
730
200
application/javascript
Script
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsvRqEGkTPPPIvXUEs-t4s14wB9D01eAohyTW8FNwKuWMtewoZ3aIaWiZb4q7Lo8dKQiulAYDPAZzq0lEchMKFwhg51Dz-D-CHYqb78LomyZQsedfVCw&sig=Cg0ArKJSzPxB5sTf47UyEAE&id=lidar2&mcvt=1430&p=152,190,242,1160&asp=152,190,242,1160&mtos=1430,1430,1430,1430,1430&tos=1430,0,0,0,0&v=20210922&bin=7&avms=nio&bs=1350,940&mc=1&app=0&itpl=3&adk=2987574385&rs=4&met=mue&la=0&cr=0&osd=1&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCxudWxsXQ%3D%3D&vs=4&eosm=0&rst=1632706611392&rpt=295&isd=0&lsd=0&r=v
h2
9459.5230000559
9463.7280001771
722
42
200
image/gif
Fetch
https://api.popin.cc/td_js_sdk_171.js
http/1.1
9478.29800006
10812.62500002
13187
34497
200
text/javascript
Script
https://sg.popin.cc/popin_discovery/recommend?mode=new&url=https%3A%2F%2Fwww.cybersecasia.net%2F&&device=pc&media=www.cybersecasia.net&extra=mac&agency=ENCE-sg&topn=200&ad=100&r_category=all&country=sg&redirect=true&rid=000000&uid=6d0d01dc23ebe67f7801632731813167&info=eyJ1c2VyX3RkX29zIjoiTWFjIiwidXNlcl90ZF9vc192ZXJzaW9uIjoiMTAuMTUuNyIsInVzZXJfdGRfYnJvd3NlciI6IkNocm9tZSIsInVzZXJfdGRfYnJvd3Nlcl92ZXJzaW9uIjoiOTQuMC40NTkwIiwidXNlcl90ZF9zY3JlZW4iOiI4MDB4NjAwIiwidXNlcl90ZF92aWV3cG9ydCI6IjEzNTB4OTQwIiwidXNlcl90ZF91c2VyX2FnZW50IjoiTW96aWxsYS81LjAgKE1hY2ludG9zaDsgSW50ZWwgTWFjIE9TIFggMTBfMTVfNykgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzk0LjAuNDU5MC4yIFNhZmFyaS81MzcuMzYgQ2hyb21lLUxpZ2h0aG91c2UiLCJ1c2VyX3RkX3JlZmVycmVyIjoiIiwidXNlcl90ZF9wYXRoIjoiLyIsInVzZXJfdGRfY2hhcnNldCI6InV0Zi04IiwidXNlcl90ZF9sYW5ndWFnZSI6ImVuLXVzIiwidXNlcl90ZF9jb2xvciI6IjI0LWJpdCIsInVzZXJfdGRfdGl0bGUiOiJDeWJlcnNlY0FzaWElMjAlN0MlMjBBc2lhJ3MlMjBtb3N0JTIwdHJ1c3RlZCUyMGVudGVycHJpc2UlMjBjeWJlcnNlY3VyaXR5JTIwaW5mb3JtYXRpb24lMjBwb3J0YWwiLCJ1c2VyX3RkX3VybCI6Imh0dHBzOi8vd3d3LmN5YmVyc2VjYXNpYS5uZXQvIiwidXNlcl90ZF9wbGF0Zm9ybSI6IkxpbnV4IHg4Nl82NCIsInVzZXJfdGRfaG9zdCI6Ind3dy5jeWJlcnNlY2FzaWEubmV0IiwidXNlcl9kZXZpY2UiOiJwYyIsInVzZXJfdGltZSI6MTYzMjcwNjYxMzE2OCwiZnJ1aXRfYm94X3Bvc2l0aW9uIjoiIiwiZnJ1aXRfc3R5bGUiOiIifQ==&callback=_p6_947e69c522ae
http/1.1
9492.4300001003
11238.837000215
28358
139918
200
application/javascript
Script
https://api.popin.cc/popin_discovery5-min.js
http/1.1
9492.5999999978
11173.610000173
43216
155594
200
application/javascript
Script
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsv0B4QJAzz8Bs1BTMGTkVrgGWT4vlW3NGnGmj2_u1ACUG8g-JrvHu8DlVswD8kCCtZJAmULP6MJLa-aCf5wAj7ZYumx3mTwaSFuG8ijt_6NAQ1UJPXg&sig=Cg0ArKJSzE3Sse9rUvW-EAE&id=lidar2&mcvt=1243&p=279,132,369,860&asp=279,132,369,860&mtos=1243,1243,1243,1243,1243&tos=1243,0,0,0,0&v=20210922&bin=7&avms=nio&bs=1350,940&mc=1&app=0&itpl=3&adk=525574821&rs=4&met=mue&la=0&cr=0&osd=1&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCxudWxsXQ%3D%3D&vs=4&eosm=0&rst=1632706611425&rpt=442&isd=0&lsd=0&r=v
h2
9502.0860000513
9507.4460001197
722
42
200
image/gif
Fetch
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/styles__ltr.css
h2
9616.0820000805
9627.9610001948
26477
52867
200
text/css
Stylesheet
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__en.js
h2
9616.4510000963
9627.1699999925
136080
347292
200
text/javascript
Script
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/styles__ltr.css
h2
9617.5500000827
9633.2190001849
53791
52867
200
text/css
Stylesheet
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__en.js
h2
9618.0460001342
9629.4840001501
348053
347292
200
text/javascript
Script
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstmiz_XYoo7uJZHRxZOeAV3lheLInttn6Vub29PNDVgplZ4sA4UDHdoLJmwhCmgBlel2VCO221sOe2WuaDv32dEMHTH8N95QcbtC0r3gQkzwE1ABVjlpeRlxebHFGA6WsYIzMhotn5eTQM0P8ht3u97uH8GNxrTD6lM3GZf6Q81BmWw9rudKENvzJIGw25JCje2uV5C9R3esQA-fr2ObkD2BUaAvcvW-564cTSM5HbKXZ1FU1RgpYS1qfL67oN7ovEa-ob6J8z-ctLdL1OxlX6PsnEQ-lGUm33OCHTW9Vwounsq0MaEpn5JogpRH5dc&sai=AMfl-YRtgQ9aYrkKw0bORSNMc13fTEOjQQw8Eyj0SPx_J_PLRpxN027zcOTYTblLGcO8twoekEBrDYBrOGPuY8_iu1SLjLn2cUfZ0Gg68VZW2r349W--xQhJaN51oKx67Cg&sig=Cg0ArKJSzDw7-hRZ3oG8EAE&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCxudWxsXQ%3D%3D&adurl=
h2
9626.6450001858
9714.5420000888
1002
0
200
image/gif
Fetch
https://s0.2mdn.net/879366/dfa7banner_html_inpage_rendering_lib_200_268.js
h2
9632.1720001288
9639.9730001576
39484
111171
200
text/javascript
Script
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjstiencUsaLq5CCTTG8BUjiFS9VgYbefqlDL8ER0t3DNVNuiRv9Ps1svmPdkwDq6vmJrZTvcXjieZFC-d4jxD19tb0kxYJihXDM0IQo7SRoQkvfrXK-_&sig=Cg0ArKJSzI3smj95lhUbEAE&id=lidar2&mcvt=1090&p=519,1004,769,1304&asp=519,1004,769,1304&mtos=1090,1090,1090,1090,1090&tos=1090,0,0,0,0&v=20210922&bin=7&avms=nio&bs=1350,940&mc=1&app=0&itpl=3&adk=951038268&rs=4&met=mue&la=0&cr=0&osd=1&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCxudWxsXQ%3D%3D&vs=4&eosm=0&rst=1632706611455&rpt=720&isd=0&lsd=0&r=v
h2
9684.4860001002
9689.321000129
722
42
200
image/gif
Fetch
https://www.gstatic.com/recaptcha/api2/logo_48.png
h2
9800.0320000574
9803.2260001637
3127
2228
200
image/png
Image
https://fonts.gstatic.com/s/roboto/v18/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
h2
9800.7640000433
9804.0899999905
11506
10748
200
font/woff2
Font
https://fonts.gstatic.com/s/roboto/v18/KFOlCnqEu92Fr1MmEU9fBBc4AMP6lQ.woff2
h2
9800.962000154
9805.4500001017
11753
10788
200
font/woff2
Font
https://www.gstatic.com/recaptcha/api2/logo_48.png
h2
9873.4120000154
9876.4120000415
3127
2228
200
image/png
Image
https://fonts.gstatic.com/s/roboto/v18/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
h2
9873.9700000733
9877.9390000273
11713
10748
200
font/woff2
Font
https://fonts.gstatic.com/s/roboto/v18/KFOlCnqEu92Fr1MmEU9fBBc4AMP6lQ.woff2
h2
9874.2170000914
9877.6130001061
11755
10788
200
font/woff2
Font
https://s0.2mdn.net/dfp/1890797/4788317706/1630555304007/index.html
h2
9930.2910000551
9988.9309999999
17138
58235
200
text/html
Document
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuJyBP4F4MCd3GN6l9L35CeBo-xlCrpTh7MNKkGOpcB2QoIIww5Itt1lKouR3Y5UyfPK3_I8BuB6tCq06ypNShuGEhpjF--j0oqQlooR5ar10d3NXct5AZNATMUyarFgoULFAmE4eRJjGSVL3QLZOsYh5XgBCoU7GovZij6Cz-WvbT1R3yTDwU5RccUDnXTUUthTEZMbcNWlU1NKhI6m3lmiCEBnu15xm53JWBQQ8JGj3MWqqYdG7pzazw_dE6U0xRKpRgGBfjb65uEPXeUCu711aow0BiTJyNsyZhpE8Cl29tJ73rx6dRXvgXUiw&sai=AMfl-YQL-uGefnCz9w0S-9rbVWsaFMikILy0HxeK360qrH5PYo2KeROVooge3Q-RBUHv5Y-k0vGmtqOIdJqux22J5XC9V1_986eH5Bn5k1Znaz3FTRBddtTB5Xf3fSGKiB0&sig=Cg0ArKJSzEzi_NqDNspnEAE&urlfix=1&adurl=
h2
9930.5200001691
9944.3210000172
813
0
200
image/gif
Image
https://www.google.com/recaptcha/api2/webworker.js?hl=en&v=tftmXwdbgCvrXiHxr5HGbIaL
h2
9932.9540000763
9939.3420000561
894
102
200
text/javascript
Other
https://www.google.com/recaptcha/api2/webworker.js?hl=en&v=tftmXwdbgCvrXiHxr5HGbIaL
h2
9945.2630002052
9950.206000125
894
102
200
text/javascript
Other
https://www.google.com/recaptcha/api2/reload?k=6LcOQLAUAAAAAJE6aHUcEpbVmTsNus99g_88TITd
h2
10372.82600021
10422.402000055
16779
29030
200
application/json
XHR
https://s0.2mdn.net/879366/DcmEnabler_01_243.js
h2
10376.509000082
10382.317000069
11520
29596
200
text/javascript
Script
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuAIs0Zz43lBpCZ5G56YovgtC1qPDVg8lsLQNOhnK9JA7v1micoAd7yYFEjCq9wtINzysBpDHfPWI_IgbAPCyU_H9g1QWtLRySiSNy3AmkCCMEcQSVjX1bus0ebHOeFnRf6CQ8hvbeiGX_yeDK9CB22m1ujOXYfJ30bPy9K8NkkrnoBgdCTzj-Jp0GD7B0m4eSAtTLQBHPtLoVhCxIu8o6eyG4Ob3gf9ZzLo_YOVW2q0q94M_0wyJHV5OGwqNHX4KWWz3sM4RzBKmH7bAkIzGop4nf7_-q8nSZeBWPr4vYAiUoi5t-Wg0zV8tpF20iL&sai=AMfl-YSXCvFoA-vh9hLR7z-ragUElJnXECecbdYMXs4CzSIyso1t7zQ6ecRbeLGq39ZUyv4qCyaN0BfQBicuF8mhSWqGmeyHf8ho7zBJTnZ-s6b_o-JB_Xc0qm7n5CBmrzo&sig=Cg0ArKJSzBsUmFv_c32FEAE&urlfix=1&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCxudWxsXQ%3D%3D&adurl=
h2
10430.291000055
10501.065000193
1002
0
200
image/gif
Fetch
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Voting-banner-final.gif
http/1.1
10517.484000186
13717.217000201
1784922
1784510
200
image/gif
Image
https://dgdwa0ulmobn4.cloudfront.net/wp-content/uploads/2020/10/Slider_welcome_player.jpg.webp
h2
10606.017000042
10926.321000094
1094
1400
404
text/html
Image
https://r.popin.cc/log.gif?type=related-th&uid=6d0d01dc23ebe67f7801632731813167&url=https%3A%2F%2Fwww.cybersecasia.net%2F&t=1632706615011
http/1.1
11331.537000136
12136.553000193
308
35
200
image/gif
Image
https://www.google-analytics.com/collect?v=1&_v=j93&a=212376847&t=event&_s=2&dl=https%3A%2F%2Fwww.cybersecasia.net%2F&ul=en-us&de=UTF-8&dt=CybersecAsia%20%7C%20Asia%27s%20most%20trusted%20enterprise%20cybersecurity%20information%20portal&sd=24-bit&sr=800x600&vp=1350x940&je=0&ec=&ea=Ivory%20Search%20-%20Default&el=&_u=aAhAAUABAAAAAC~&jid=&gjid=&cid=1844410173.1632706611&tid=UA-145136419-1&_gid=1924785970.1632706612&gtm=2ou9m0&z=33614345
h2
12308.763000183
12312.04400002
624
35
200
image/gif
Image
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=2021092001&st=env
h2
12311.040000059
12320.465000113
8930
10816
200
application/json
XHR
https://ma.zoho.com/hub/js/MagicPopup.js?t=1632706615994
http/1.1
12313.832000131
12626.517000142
7165
27086
200
application/javascript
Script
https://tpc.googlesyndication.com/sodar/sodar2.js
h2
12409.970000153
12415.456000017
7242
17713
200
text/javascript
Script
https://maillist-manage.com/wa/PopupRequest?callback=processData&webAutoId=27218d28c96aa859e529e5bdf4a9ccfb6&zuid=2ac5d97184e3b631c6a73058460b2a736&domain=2a8d665163b105b383759cab4da946a376a73058460b2a736&orgDomainId=2ea4fb3d57d695ac93527561a82ffdb4140fbf6cd35f5c50c&reqType=0&ref=&socialshare=null&value=CybersecAsia%20%7C%20Asia%27s%20most%20trusted%20enterprise%20cybersecurity%20information%20portal&zc_cu_exp=1632733613000,1&action=viewed&zc_cu=3zffb6abfc576144c5878d1b556a511413-v3z72800e47dd6e144404cfafb3b280ebec51f7ee75086e4540c9b509a5625d0720&url=https%3A%2F%2Fwww.cybersecasia.net%2F&parentUrl=https%3A%2F%2Fwww.cybersecasia.net%2F&from=WA
http/1.1
12711.243000114
13113.949000137
1018
296
200
application/javascript
Script
https://tpc.googlesyndication.com/sodar/sodar2/224/runner.html
h2
12719.956000103
12726.009000093
5648
12789
200
text/html
Document
https://www.google.com/recaptcha/api2/aframe
h2
12721.841000021
12729.051000206
1486
783
200
text/html
Document
https://pagead2.googlesyndication.com/pagead/sodar?id=sodar2&v=224&li=gpt_2021092001&jk=3514731079085570&rc=05AH-MKGVEYn_RVoWzgi3enYugOfhKDAYYC3IdanLco1xenizM2L-YaJ9Qm-hsCNawLsr8E2wWt_WCmkuqjSc89-Mz8P8wcM8q1ZZjPbv8RGEXEyU0NWvZnvWviSgiznffJwUCmMJOcS87GZkdf3wgpm1LQFbQziwDVJUSqBdBfGOUsz5cCkZExXZsyKUkYfuaro5bzjFbSWwDkk1YxBh2vjKxiQYhoweEeJPNuMViU0rUyEe6OtBfWgSDRIn4080B-bAhcuMtpPfFOT7WnZFshtqLWFnEN7ZeSxdnwYm5Ah6hW3NFrg
h2
12759.525000118
12777.503000107
543
0
204
text/html
Image
https://pagead2.googlesyndication.com/bg/WOdvqX5MrEWan8NE-dDT01W_bgveDh48divqo2Vh5b0.js
h2
12763.571000192
12768.333000131
14491
36113
200
text/javascript
Script
https://fonts.googleapis.com/css?family=Nunito+Sans:400,600,700
h2
13007.263000123
13025.39100009
1371
4954
200
text/css
Stylesheet
https://ma.zoho.com/wa/PopupSignUpForm?callback=processData&pType=1&popupInfoMap_Id=591128000003363013&listId=18341bc8b8e7c8bb&signupFormId=18341bc8b8fcd0bd&m=getSignupUrl&zuid=2ac5d97184e3b631c6a73058460b2a736&from=WA&ind=0
http/1.1
13156.211000169
13473.392000189
1059
174
200
application/javascript
Script
https://pagead2.googlesyndication.com/pagead/sodar?id=sodar2&v=224&t=2&li=gpt_2021092001&jk=3514731079085570&bg=!nZ6lntrNAAZNQyuQTUM7ACkAdvg8WrDuDbpXbAO4MIhxAGxzYDaUjOULf922n2qy1EOT3Z3t-nTh_QIAAAGeUgAAABRoAQcKABWCB_iDJyn1KYz0yg3pTGN2jMl0bFmZAngjKRwN-SNskhITVHBiZBlcN7enVIJ1WOKarTRyOGTdLcgnb3K-PWDTMQzRt4K5i-tzP16LNaMlpPsS8TDNxB5fi28bCfOzE-ZcD9-T-xGatOWZp4eszM6_xlfNmbYLEcm5gnF296dTzMzYMOdtLQ7HDALV8TmLv9ZKDGs06e-pexarE0M3xY99HBD9my1oakg7TnHh7OfhkFo4JuoCiCPe6zmtkRiRJfcr2jD9pmtMC5FIOXeRMPrW6FLDQw0chBeQfncxIHpsPRzb8isZQED1ZmO3swW-7-_cKiKY3qIoh-HI0ZSrCVP1vtI_Ox9MXe5vGjCTcSxdn6c_45xerCH-JgJZ0dRWDbknE0OFwScLQF1xGhN83oUFHM3zTpWABK44cQGDwcVhjLe8qfjFY6RjBlnVwP8u6IWdx9VkXMv7BXf6etcj7v1FS09foLABIsq_XmoGJC0UWeKT8VydE4jSb-cglcFkQ35SSbRtrlfSIYIqbVv79IqSdl2FlsTdE0bgj_WTWa5HJtHhCFDvj4HCCAiOZXEnrmfqlF8uHWIASdPozEn4X4BwL6YB40pLTRPzQFiLqdnNk97-RVfBBawPSdESixmQCT0bKxO0jhCNlm9RSFEI6blRQrXtkyF_zrMXtuaoPDpawJpEQ5Xz8XdllT4k1UWzelUogCNfqavsWQcyJ_71G29ZIG6S7WqDPKWNLeC_Ea_Qp3WpbxRak_5sgy8sI8RDwbg1Z92pk5so4dOOUcSAKfTsn8zezhHWehWHJY9MKfynb2wXNrQI3mB_jp7Mrxlwcc89el0Y68HvxX6ziwtVkRGlI4VToxnaSX-qZ1PMwNf0eQ
h2
13239.074000157
13250.172000146
543
0
204
text/html
Image
https://ma.zoho.com/ua/Optin?od=11287ecb040c03&zx=12986efb5&lD=18341bc8b8e7c8bb&n=11699f74fed2ef8&sD=18341bc8b8fcd0bd
http/1.1
13476.792000001
13942.281000083
6073
26110
200
text/html
XHR
https://js.zohostatic.com/campaigns/hubstatic/hub/js/optin.min.js?t=1632706617632
http/1.1
13951.095000142
14183.953
11579
38273
200
application/javascript
Script
https://campaign-image.com/zohocampaigns/12983cd36_bg_1.jpg
http/1.1
13963.020000141
14426.508000121
16647
16324
200
image/jpeg
Image
https://ma.zoho.com/images/challangeiconenable.jpg
http/1.1
13963.177000172
14425.909999991
1314
969
200
image/jpeg
Image
https://ma.zoho.com/images/videoclose.png
http/1.1
13963.443000102
14273.454000009
3313
2967
200
image/png
Image
https://cped.maillist-manage.com/ua/TrailEvent
http/1.1
14232.65700019
14794.277000008
870
0
200
application/javascript
XHR
https://cped.maillist-manage.com/ua/waformrep
http/1.1
14233.792999992
14721.211000113
947
0
200
application/json
XHR
https://ma.zoho.com/js/dig.js
http/1.1
14233.955000062
14541.631000116
2479
5598
200
application/javascript
Script
Network Round Trip Times — 0 ms
High Network RTT (Round Trip Times) can have a large impact on performance. Providing servers geographically closer to the user could improve performance.
Server Backend Latencies — 0 ms
High server latencies indicate the server is overloaded or has a poor backend performance.
Tasks
Below is a list of the top-level main thread tasks that executed during page load.
Start Time (Ms) End Time (Ms)
5700.247
7.01
5712.84
6.177
5728.413
6.253
5734.832
5.916
5740.895
5.66
5748.434
5.151
6635.863
16.625
6867.487
5.205
7063.242
13.936
7092.024
31.807
7124.177
31.359
7155.551
35.768
7196.94
12.75
7209.702
27.309
7237.624
41.405
7281.182
7.452
7289.455
19.553
7309.452
17.925
7327.403
11.55
7347.625
15.615
7367.815
9.74
7382.054
8.979
7393.629
85.707
7479.497
7.213
7488.584
177.976
7682.155
7.905
7698.693
27.443
7726.146
6.092
7734.369
41.075
7775.468
30.417
7805.907
29.453
7835.379
9.366
7844.756
29.682
7874.464
29.083
7903.571
32.628
7940.121
5.462
7945.61
5.769
7977.906
17.048
7999.271
5.633
8010.488
51.709
8062.244
7.281
8075.471
106.405
8189.825
47.195
8242.279
54.739
8301.349
42.984
8344.531
51.885
8396.757
8.787
8414.112
32.556
8463.349
40.679
8510.519
5.242
8538.756
7.843
8561.349
68.778
8630.17
7.291
8649.738
6.547
8674.94
17.177
8700.272
124.541
8824.852
28.831
8853.705
16.491
8876.847
357.88
9234.822
10.084
9265.143
9.375
9275.415
7.976
9285.464
7.294
9309.141
5.111
9323.372
132.74
9456.303
10.503
9490.597
7.906
9515.139
22.466
9560.39
11.605
9572.098
8.954
9609.026
18.327
9628.759
8.981
9643.408
13.518
9663.017
9.021
9672.053
53.7
9770.516
82.097
9853.574
84.731
9938.343
10.79
9952.993
20.466
9989.877
15.985
10012.855
8.153
10025.12
53.186
10086.701
30.389
10119.452
24.33
10150.451
7.513
10158.841
19.928
10179.885
5.528
10192.858
119.102
10311.994
8.452
10320.459
17.141
10360.319
11.783
10372.385
14.224
10396.944
12.828
10412.201
5.593
10419.397
5.761
10431.746
6.783
10455.991
21.541
10489.404
6.268
10515.518
16.236
10546.383
5.785
10569.211
37.284
10614.505
11.831
10639.048
24.122
10667.35
9.118
10680.784
5.111
10697.691
23.275
10781.61
5.284
10791.272
20.024
10811.333
9.058
10820.903
8.183
10834.909
5.181
10848.579
6.726
10860.732
14.057
10874.819
5.02
10911.464
7.879
10961.481
6.308
10978.284
7.109
10994.838
17.711
11012.617
16.325
11028.98
16.573
11045.611
17.132
11224.718
103.956
11333.055
11.142
11349.568
10.246
11361.437
14.595
11376.086
16.304
11393.02
11.9
11419.362
7.525
11635.857
24.776
11660.798
6.017
11666.931
7.996
11761.639
13.774
11775.468
6.051
12178.387
5.331
12187.958
174.959
12362.968
17.282
12382.548
63.199
12449.74
7.566
12457.365
215.895
12673.303
33.192
12714.038
13.194
12738.787
8.567
12750.284
6.028
12756.357
10.104
12766.611
10.147
12776.912
6.801
12783.73
6.866
12815.123
26.739
12841.911
12.293
12858.846
12.732
12884.14
13.175
12901.549
15.555
12920.596
11.647
12936.34
13.995
12953.874
6.837
12967.239
14.776
12985.898
6.257
12998.89
11.943
13019.079
12.534
13035.477
10.598
13048.951
6.695
13055.812
11.467
13068.305
7.531
13075.872
5.976
13082.888
9.435
13095.139
45.719
13141.025
11.635
13155.555
16.016
13181.713
16.288
13212.415
14.54
13230.623
6.927
13237.574
8.752
13255.879
7.913
13278.348
6.301
13680.895
16.199
13697.122
11.839
13888.368
13.129
13901.525
17.102
13918.962
12.267
13949.662
8.016
13968.483
6.201
13983.785
6.806
13990.621
18.581
14009.353
5.608
14020.995
15.919
14039.953
11.413
14053.928
11.569
14065.712
14.811
14080.741
15.7
14096.728
15.357
14112.337
16.499
14128.874
16.777
14148.698
13.708
14165.095
13.675
14178.808
16.916
14195.95
16.566
14212.962
15.862
14228.952
16.634
14246.631
15.821
14270.42
5.499
14369.678
5.106
14401.981
6.547
14474.658
6.456
14581
5.662
14595.45
6.057
14744.535
7.74
15213.975
6.848
15409.802
6.382
15811.12
12.072
15845.646
6.5
15861.874
5.631
15878.165
5.521
15894.515
5.409
15918.781
5.48
15927.773
5.647
15944.454
5.129
15961.213
5.095
15977.845
5.364
15994.538
5.099
16027.845
5.85
16044.534
5.494
16061.212
5.607
16077.933
7.079
16094.714
5.375
16111.18
5.78
16127.858
5.551
16161.172
5.321
16177.847
5.054
16194.449
5.106
16211.144
5.275
16227.95
5.792
16247.449
5.801
16261.285
6.202
16277.977
5.958
16294.703
7.278
16311.361
6.337
16328.727
7.818
16344.535
5.915
16361.255
7.666
16378.196
8.099
16394.699
8.2
16411.384
8.146
16429.091
6.786
16444.568
5.999
16453.234
7.085
16463.319
6.51
16478.025
6.012
16494.78
7.078
16511.219
6.328
16528.146
11.109
16544.634
6.858
16564.217
6.902
16577.938
12.932
16594.578
6.795
16611.359
8.596
16628.009
6.143
16645.572
5.894
16661.331
7.329
16677.964
6.028
16694.618
6.486
16711.355
8.038
16728.047
8.655
16745.624
7.868
16761.215
28.045
16795.878
7.779
16811.367
6.354
16828.031
5.677
16844.492
6.464
16861.277
7.045
16878.444
6.349
16892.497
6.437
16898.968
6.54
16911.466
5.104
16927.826
7.22
16944.556
6.447
16961.504
6.031
16977.85
5.151
16994.544
12.916
17014.712
5.191
17027.801
5.18
17044.481
8.858
Diagnostics
Below is a collection of useful page vitals.
View Data
Metrics
Below is a collection of metrics.
View Data
Script Treemap Data
Provide as required, for treemap app.

Metrics

First Contentful Paint — 1.0 s
The time taken for the first image or text on the page to be rendered.
Total Blocking Time — 190 ms
The total blocking time is the sum of all time periods between First Contentful Paint and Time to Interactive (when task length exceeded 50ms).

Other

Max Potential First Input Delay — 180 ms
Users could experience a delay when interacting with the page.
First Meaningful Paint — 1.0 s
The time taken for the primary content of the page to be rendered.

Opportunities

Eliminate render-blocking resources — Potential savings of 370 ms
Resources, such as JavaScript and style sheets, can block the first paint of the page. Cybersecasia.net should consider delivering critical JavaScript/style sheets (JS/CSS) inline and deferring all non-critical JS/CSS.
URL Transfer Size (Bytes) Potential Savings (Ms)
https://www.cybersecasia.net/wp-content/themes/Extra/style.min.css?ver=4.10.8
43707
80
https://www.google.com/recaptcha/api.js?render=6LcOQLAUAAAAAJE6aHUcEpbVmTsNus99g_88TITd
1202
230
https://www.cybersecasia.net/wp-includes/js/jquery/jquery.min.js?ver=3.6.0
31177
80
Reduce unused CSS — Potential savings of 128 KiB
Dead and/or unused rules in Style Sheets (CSS) can contribute to network payload sizes. Cybersecasia.net should consider removing dead rules from style sheets and deferring the loading of CSS not used for above-the-fold content.
URL Transfer Size (Bytes) Potential Savings (Bytes)
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/styles__ltr.css
53791
51011
https://www.cybersecasia.net/wp-content/themes/Extra/style.min.css?ver=4.10.8
43707
37493
@font-face{font-family:ETmodules;font-display:block;src:url(https://www.cybersecasia.net/wp-content/...
16797
16292
https://www.cybersecasia.net/wp-content/plugins/supreme-modules-for-divi/styles/style.min.css?ver=2.4.0
15157
15153
https://www.cybersecasia.net/wp-includes/css/dist/block-library/style.min.css?ver=5.8.1
10714
10714
Reduce unused JavaScript — Potential savings of 228 KiB
It is advised to remove unused JavaScript in order to reduce bytes consumed by network activity.
URL Transfer Size (Bytes) Potential Savings (Bytes)
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__en.js
136081
69867
https://www.cybersecasia.net/wp-content/themes/Extra/scripts/scripts.min.js?ver=4.10.8
79702
52405
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021092001.js?31062913
121104
51420
https://api.popin.cc/popin_discovery5-min.js
43216
36670
https://marketinghub.zoho.com/hub/js/WebsiteAutomation.js
36879
23237
Enable text compression — Potential savings of 250 KiB
Text-based resources should be served with compression, such as gzip, deflate or brotli.
URL Transfer Size (Bytes) Potential Savings (Bytes)
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__en.js
347292
213089
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/styles__ltr.css
52867
27062
https://tpc.googlesyndication.com/safeframe/1-0-38/js/ext.js
23011
15985
Avoid multiple page redirects — Potential savings of 340 ms
Redirects can cause additional delays before the page can begin loading. Cybersecasia.net should avoid multiple or unnecessary page redirects.
URL Time Spent (Ms)
http://cybersecasia.net/
190
https://cybersecasia.net/
150
https://www.cybersecasia.net/
0

Diagnostics

Reduce JavaScript execution time — 3.0 s
JavaScript (JS) execution time can be lowered by reducing the time required for parsing, compiling and executing JS. Delivering smaller JS payloads may help with this.
URL Total CPU Time (Ms) Script Evaluation (Ms) Script Parse (Ms)
https://www.cybersecasia.net/wp-includes/js/jquery/jquery.min.js?ver=3.6.0
1175.195
495.231
1.588
https://www.cybersecasia.net/wp-content/plugins/smart-slider-3/Public/SmartSlider3/Application/Frontend/Assets/dist/n2.min.js?ver=821e0c40
885.19799999998
214.42
0.843
https://www.cybersecasia.net/wp-content/plugins/popups-for-divi/scripts/ie-compat.min.js?ver=3.0.3
733.777
216.155
0.274
Unattributable
697.76899999999
10.054
0.212
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__en.js
547.319
463.166
44.419
https://www.cybersecasia.net/
541.427
34.822
7.196
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
525.413
447.562
13.075
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021092001.js?31062913
455.199
335.22
19.867
https://www.googletagservices.com/activeview/js/current/osd.js
342.326
304.242
2.267
https://tpc.googlesyndication.com/sodar/sodar2/224/runner.html
246.873
233.322
3.199
https://www.cybersecasia.net/wp-content/themes/Extra/scripts/scripts.min.js?ver=4.10.8
135.226
56.91
4.939
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LcOQLAUAAAAAJE6aHUcEpbVmTsNus99g_88TITd&co=aHR0cHM6Ly93d3cuY3liZXJzZWNhc2lhLm5ldDo0NDM.&hl=en&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=sgfduhsdlllv
77.406
65.894
1.935
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LcOQLAUAAAAAJE6aHUcEpbVmTsNus99g_88TITd&co=aHR0cHM6Ly93d3cuY3liZXJzZWNhc2lhLm5ldDo0NDM.&hl=en&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=ywf7o69k5ble
77.004
60.651
2.873

Metrics

Speed Index — 21.5 s
The time taken for the page contents to be visibly populated.
Largest Contentful Paint — 36.1 s
The timing of the largest text or image that is painted.
Time to Interactive — 25.1 s
The time taken for the page to become fully interactive.
Cumulative Layout Shift — 0.489
Cumulative Layout Shift is the measurement of visible elements collective movement within the viewport.
View Data

Opportunities

Properly size images — Potential savings of 27,756 KiB
Images can slow down the page's load time. Cybersecasia.net should consider serving more appropriate-sized images.
URL Resource Size (Bytes) Potential Savings (Bytes)
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/phishing+kity.jpg
14776094
14774623
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Homepage-DiamondSponsor-BT3.gif
3113045
2557712
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/final-silver-synopsys.gif
1586511
1303495
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Government+agency+escapes+a+cyberattack+while+trialing+an+AI+security+solution.jpg
1295421
1294936
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/cyber-financial.jpg
1138111
1137343
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/online-financial.jpg
1048311
1047603
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/banking-fraud.jpg
989836
988427
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/zero-trust11.jpg
961442
937638
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/2021/hybrid-workplace1111.jpg
901943
901605
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Callsign+-+Rethink+your+SMS+Approach.jpg
815398
800338
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Running+outdated+software+on+your+server.jpg
724324
723835
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/cs_kyocera.jpg
530207
529452
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-3-21111.jpg
396713
384602
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/CYBERSECasia.fw.png
297045
289886
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-21111.jpg
311074
265131
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/sparking.jpg
147690
147581
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/online-banking.jpg
136801
136565
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Quick+Link.png
117841
114222
https://www.cybersecasia.net/wp-content/uploads/2021/03/widget-homepage3.png
43647
32936
https://www.cybersecasia.net/wp-content/uploads/2021/09/Staying-current-is-key-for-security-in-businesses1-440x264.jpg
30347
23434
https://www.cybersecasia.net/wp-content/uploads/2021/09/Adopting-an-attacker-mindset-is-good-for-cybersecurity-440x264.jpg
27366
21132
https://dgdwa0ulmobn4.cloudfront.net/wp-content/plugins/smart-slider-3/Public/SmartSlider3/Widget/Shadow/ShadowImage/Assets/shadow/dark.png
10576
9618
Defer offscreen images — Potential savings of 20,592 KiB
Time to Interactive can be slowed down by resources on the page. Cybersecasia.net should consider lazy-loading offscreen and hidden images.
URL Resource Size (Bytes) Potential Savings (Bytes)
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/claroty3.gif
3301975
3301975
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/hillstone-gold.gif
3270699
3270699
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Homepage-DiamondSponsor-BT3.gif
3113045
3113045
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/video-crowdstrike.png
1895752
1895752
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Veeam-thumbnail-2-fir.png
1520835
1520835
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Veeam-thumbnail-1-sec.png
1023519
1023519
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/video-fortinet.jpg
651938
651938
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/rep-ossra-2021.jpg
646773
646773
https://www.cybersecasia.net/wp-content/uploads/2020/10/Slider_welcome_player.jpg
574586
574586
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Cisco-thumbnail-1-q4.jpg
522686
522686
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Peril+in+a+Pandemic_032221.jpg
511569
511569
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-1+copy.jpg
478847
478847
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/CYBERSECasia.fw.png
297045
297045
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Fortinet+-+thumbnail-0017.jpg
271035
271035
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Fortinet+-+thumbnail-001.jpg
254356
254356
https://www.cybersecasia.net/wp-content/uploads/2019/11/How-to-protect-your-business-in-the-digital-economy-440x264.jpg
122381
122381
https://www.cybersecasia.net/wp-content/uploads/2021/01/Untitled-440x264.png
116294
116294
https://www.cybersecasia.net/wp-content/uploads/2019/11/cybercrimecon-440x264.jpg
114563
114563
https://www.cybersecasia.net/wp-content/uploads/2020/09/Frost-Sullivan-Assesment-BlackBerry-White-Paper-6-22-20-440x264.png
112157
112157
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-the-state-of-the-security-team-research-report11-440x264.jpg
101532
101532
https://www.cybersecasia.net/wp-content/uploads/2020/12/THUMBNAIL-TEMPLATE-paloalto-440x264.jpg
89547
89547
https://www.cybersecasia.net/wp-content/uploads/2020/08/BYLINE-CYBERSEC-copy11-440x264.jpg
87881
87881
https://www.cybersecasia.net/wp-content/uploads/2021/02/Thumbnail_LP-440x264.jpg
67682
67682
https://www.cybersecasia.net/wp-content/uploads/2021/02/Continuous-Security-Putting-it-all-Together-440x264.jpg
63874
63874
https://www.cybersecasia.net/wp-content/uploads/2021/02/AppSec-In-the-DevOps-Environment2-440x264.jpg
60281
60281
https://www.cybersecasia.net/wp-content/uploads/2021/01/prioritize2021-440x264.jpg
56076
56076
https://www.cybersecasia.net/wp-content/uploads/2021/01/Thales-thumbnail-1-440x264.jpg
55011
55011
https://www.cybersecasia.net/wp-content/uploads/2021/02/Continuous-Application-Security-with-HCL-AppScan-440x264.jpg
54160
54160
https://www.cybersecasia.net/wp-content/uploads/2021/01/Thales-thumbnail-2-440x264.jpg
54128
54128
https://www.cybersecasia.net/wp-content/uploads/2021/04/shellcode-440x264.jpg
44857
44857
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-security-operations-maturity-model-white-paper-updated-440x264.jpg
37688
37688
https://www.cybersecasia.net/wp-content/uploads/2021/07/ransomware-fortinet-guide-440x264.jpg
36610
36610
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_QuickGuide_2020_EnableSecureYourRemoteWorkforce-440x264.jpg
36298
36298
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-trending-phishing-techiques-white-paper-2020-440x264.jpg
36278
36278
https://www.cybersecasia.net/wp-content/uploads/2021/07/Fortinet-thumbnail-07689792-440x264.jpg
35381
35381
https://www.cybersecasia.net/wp-content/uploads/2020/09/7-benefits-of-cloud-email-security-440x264.jpg
35371
35371
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-true-cost-of-free-440x264.jpg
34597
34597
https://www.cybersecasia.net/wp-content/uploads/2020/03/HOW-SMES-CAN-QUICKLY-AND-COST-EFFECTIVELY-DEPLOY-DEFENSES-AGAINST-CYBERTHREATS-440x264.jpg
31384
31384
https://www.cybersecasia.net/wp-content/uploads/2021/08/sakura-new-440x264.jpg
31208
31208
https://www.cybersecasia.net/wp-content/uploads/2020/12/fortinet-video-440x264.jpg
31074
31074
https://www.cybersecasia.net/wp-content/uploads/2021/08/thumbnail-m1-440x264.jpg
30655
30655
https://www.cybersecasia.net/wp-content/uploads/2020/10/Horangi-Case-Study-Wallex-440x264.jpg
30189
30189
https://www.cybersecasia.net/wp-content/uploads/2021/06/hppp333-440x264.jpg
29790
29790
https://www.cybersecasia.net/wp-content/uploads/2020/08/BeyondTrust_Whitepaper_Quick-Guide-Enable-Secure-Your-Remote-Workforce-440x264.jpg
29063
29063
https://www.cybersecasia.net/wp-content/uploads/2021/07/Keeping-surging-cyber-threats-at-bay-in-the-New-Normal-1-440x264.jpg
28674
28674
https://www.cybersecasia.net/wp-content/uploads/2021/01/threat-landscape-440x264.jpg
28305
28305
https://www.cybersecasia.net/wp-content/uploads/2020/10/Horangi-Case-Study-Zave-440x264.jpg
27294
27294
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_Zero_Trust_Secure_Remote_Access_wp-440x264.jpg
27073
27073
https://www.cybersecasia.net/wp-content/uploads/2020/10/Gnowbe-Case-Study-440x264.jpg
26730
26730
https://www.cybersecasia.net/wp-content/uploads/2020/08/2020_Sensitive-data-protection-in-the-retail-card-payments-ecosystem-440x264.jpg
26237
26237
https://www.cybersecasia.net/wp-content/uploads/2021/01/wp-untangling-the-web-of-cloud-security-threats-440x264.jpg
26030
26030
https://www.cybersecasia.net/wp-content/uploads/2020/07/beuamer-Data-Protection-Global-Report-2019_thumbnails-440x264.jpg
25744
25744
https://www.cybersecasia.net/wp-content/uploads/2020/09/spear-phishingv4-440x264.jpg
25563
25563
https://www.cybersecasia.net/wp-content/uploads/2021/06/gartners-magic-1-440x264.jpg
24785
24785
https://www.cybersecasia.net/wp-content/uploads/2021/04/NTT_thumbnail-001-440x264.jpg
23714
23714
https://www.cybersecasia.net/wp-content/uploads/2020/06/Whitepaper_BlackBerry_ZeroTrust_FINAL-copy-440x264.jpg
23637
23637
https://www.cybersecasia.net/wp-content/uploads/2020/07/report_spear-phishing_thumbnail-440x264.jpg
23091
23091
https://www.cybersecasia.net/wp-content/uploads/2021/04/ransomware-on-the-Rise-440x264.jpg
22908
22908
https://www.cybersecasia.net/wp-content/uploads/2020/08/BeyondTrust_Whitepaper_The-Guide-to-Just-In-Time-Privileged-Access-Management-440x264.jpg
22440
22440
https://www.cybersecasia.net/wp-content/uploads/2020/07/apj-uda-holdings-case-study-440x264.jpg
22437
22437
https://www.cybersecasia.net/wp-content/uploads/2020/04/The-LogRhythm-Security-Using-Security-Operations-Maturity-Model-440x264.jpg
22308
22308
https://www.cybersecasia.net/wp-content/uploads/2020/10/Horangi-Whitepaper-Selecting-A-CSPM-Solution-440x264.jpg
22054
22054
https://www.cybersecasia.net/wp-content/uploads/2020/08/thumbnail_template-copy-440x264.jpg
21331
21331
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-top-5-remote-access-problems-440x264.jpg
20882
20882
https://www.cybersecasia.net/wp-content/uploads/2020/07/2020-SD-WAN-Report-Public-Cloud_thumbnail-440x264.jpg
20785
20785
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/MartechAsia/Featured+Images/2021/TLM-logo.svg
20285
20285
https://www.cybersecasia.net/wp-content/uploads/2021/03/Pulse-Secure_Thumbnail-1-440x264.jpg
19853
19853
https://www.cybersecasia.net/wp-content/uploads/2021/08/Fortinet-thumbnail-028-440x264.jpg
19840
19840
https://www.cybersecasia.net/wp-content/uploads/2021/06/micro-virty-440x264.jpg
18912
18912
https://www.cybersecasia.net/wp-content/uploads/2021/06/Guide-Thumbnail-1-440x264.jpg
18690
18690
https://www.cybersecasia.net/wp-content/uploads/2020/10/145606-Idaptive-Top-Ten-Considerations-WP-EN-v1-440x264.jpg
18677
18677
https://www.cybersecasia.net/wp-content/uploads/2020/10/aag-why-cisco-security-for-sb-img-440x264.jpg
18458
18458
https://www.cybersecasia.net/wp-content/uploads/2020/08/2020_Jan_ISARA-HSM-WP-v10-440x264.jpg
18446
18446
https://www.cybersecasia.net/wp-content/uploads/2020/07/Barracuda-eBook_13-email-threats_may2020_thumbnail-440x264.jpg
18392
18392
https://www.cybersecasia.net/wp-content/uploads/2020/04/2020_VT_Trends-Report-reduced-images-440x264.jpg
18233
18233
https://www.cybersecasia.net/wp-content/uploads/2021/07/Kemp-Thumbnail-1-final-440x264.jpg
18112
18112
https://www.cybersecasia.net/wp-content/uploads/2021/08/Thumbnail-srei-440x264.jpg
17839
17839
https://www.cybersecasia.net/wp-content/uploads/2020/10/145601-Idaptive_Case_Study_New-Zealand-Avocado-440x264.jpg
17519
17519
https://www.cybersecasia.net/wp-content/uploads/2020/10/enterprise-firewall-5-tips-img-440x264.jpg
17434
17434
https://www.cybersecasia.net/wp-content/uploads/2021/08/Thumbnail-0399-440x264.jpg
17411
17411
https://www.cybersecasia.net/wp-content/uploads/2020/06/Whitepaper_BringingOrdertoChaoswithUES_Final-copy-440x264.jpg
17384
17384
https://www.cybersecasia.net/wp-content/uploads/2021/04/quantum-computing-440x264.jpg
17158
17158
https://www.cybersecasia.net/wp-content/uploads/2020/10/145609-Idaptive-Six-IT-Security-Risks-WP-EN-v1_new-440x264.jpg
17043
17043
https://www.cybersecasia.net/wp-content/uploads/2021/07/Kemp-Thumbnail-2-440x264.jpg
16712
16712
https://www.cybersecasia.net/wp-content/uploads/2020/08/2020_Jun_A-Comprehensive-Guide-to-Authentication-Technologies-and-Methods-440x264.jpg
16627
16627
https://www.cybersecasia.net/wp-content/uploads/2020/08/2020_Guide_to_Database_Encryption_guide_WP_A4_v2-440x264.jpg
16589
16589
https://www.cybersecasia.net/wp-content/uploads/2021/04/building-the-foundation-440x264.jpg
16395
16395
https://campaign-image.com/zohocampaigns/12983cd36_bg_1.jpg
16324
16324
https://www.cybersecasia.net/wp-content/uploads/2021/01/black-440x264.jpg
16209
16209
https://www.cybersecasia.net/wp-content/uploads/2020/07/Cyber-AI-for-SaaS-Security_-Protecting-Your-Dynamic-Workforce-440x264.jpg
15988
15988
https://www.cybersecasia.net/wp-content/uploads/2020/10/ngfw-futureoffirewalling-wp-img-440x264.jpg
15860
15860
https://www.cybersecasia.net/wp-content/uploads/2020/07/Email-Security-Threat-Report-2020-440x264.jpg
15629
15629
https://www.cybersecasia.net/wp-content/uploads/2020/10/145608-Idaptive-IDaaS-Buyers-Guide-EN-v1-440x264.jpg
15276
15276
https://www.cybersecasia.net/wp-content/uploads/2021/04/image_2021_04_22T03_12_15_226Z-440x264.jpg
14538
14538
https://www.cybersecasia.net/wp-content/uploads/2021/03/gartner-pulse-sec-440x264.jpg
14500
14500
https://www.cybersecasia.net/wp-content/uploads/2020/04/Skybox_Cloud_Trends_Report-images-440x264.jpg
14428
14428
https://www.cybersecasia.net/wp-content/uploads/2020/04/LogRhythm-Named-a-Leader-in-2020-Gartner-SIEM-Magic-Quadrant-440x264.jpg
13654
13654
https://www.cybersecasia.net/wp-content/uploads/2020/08/2020_JUN_CipherTrust-Manager-solution-brief-for-KMIP-Clients-440x264.jpg
12384
12384
https://www.cybersecasia.net/wp-content/uploads/2020/03/Worry-free-endpoint-protection-for-SMEs-bg-440x264.jpg
9403
9403
https://ma.zoho.com/images/videoclose.png
2967
2967
Efficiently encode images — Potential savings of 19,159 KiB
Unoptimized images can consume more cellular data than what is necessary.
URL Resource Size (Bytes) Potential Savings (Bytes)
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/phishing+kity.jpg
14776094
11259844
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Government+agency+escapes+a+cyberattack+while+trialing+an+AI+security+solution.jpg
1295421
843213
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/cyber-financial.jpg
1138111
776757
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/online-financial.jpg
1048311
758095
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/2021/Is+there+a+rift+in+your+software+development+and+security+teams.jpg
1001792
694466
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/banking-fraud.jpg
989836
678875
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/zero-trust11.jpg
961442
595119
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/2021/hybrid-workplace1111.jpg
901943
567268
https://dgdwa0ulmobn4.cloudfront.net/wp-content/uploads/2021/03/bt-v3.jpg
857563
533551
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/rep-ossra-2021.jpg
646773
376773
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Cisco-thumbnail-1-q4.jpg
522686
252686
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Peril+in+a+Pandemic_032221.jpg
511569
241569
https://www.cybersecasia.net/wp-content/uploads/2020/10/Slider_welcome_player.jpg
574586
214586
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-1+copy.jpg
478847
208847
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Running+outdated+software+on+your+server.jpg
724324
205924
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Callsign+-+Rethink+your+SMS+Approach.jpg
815398
136827
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/video-fortinet.jpg
651938
133538
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-3-21111.jpg
396713
126713
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Rubrik-socmed.jpg
635459
117059
https://www.cybersecasia.net/wp-content/uploads/2019/11/How-to-protect-your-business-in-the-digital-economy-440x264.jpg
122381
93341
https://www.cybersecasia.net/wp-content/uploads/2019/11/cybercrimecon-440x264.jpg
114563
85523
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-the-state-of-the-security-team-research-report11-440x264.jpg
101532
72492
https://www.cybersecasia.net/wp-content/uploads/2020/12/THUMBNAIL-TEMPLATE-paloalto-440x264.jpg
89547
60507
https://www.cybersecasia.net/wp-content/uploads/2020/08/BYLINE-CYBERSEC-copy11-440x264.jpg
87881
58841
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-21111.jpg
311074
41074
https://www.cybersecasia.net/wp-content/uploads/2021/02/Thumbnail_LP-440x264.jpg
67682
38642
https://www.cybersecasia.net/wp-content/uploads/2021/02/Continuous-Security-Putting-it-all-Together-440x264.jpg
63874
34834
https://www.cybersecasia.net/wp-content/uploads/2021/02/AppSec-In-the-DevOps-Environment2-440x264.jpg
60281
31241
https://www.cybersecasia.net/wp-content/uploads/2021/01/prioritize2021-440x264.jpg
56076
27036
https://www.cybersecasia.net/wp-content/uploads/2021/01/Thales-thumbnail-1-440x264.jpg
55011
25971
https://www.cybersecasia.net/wp-content/uploads/2021/02/Continuous-Application-Security-with-HCL-AppScan-440x264.jpg
54160
25120
https://www.cybersecasia.net/wp-content/uploads/2021/01/Thales-thumbnail-2-440x264.jpg
54128
25088
https://www.cybersecasia.net/wp-content/uploads/2021/04/shellcode-440x264.jpg
44857
15817
https://www.cybersecasia.net/wp-content/uploads/2021/07/hybrid-workplace1111-284x170.jpg
24057
11987
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/cs_kyocera.jpg
530207
11807
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_QuickGuide_2020_EnableSecureYourRemoteWorkforce-60x80.jpg
11869
10669
https://www.cybersecasia.net/wp-content/uploads/2021/04/myanmar2-60x60.jpg
11332
10432
https://www.cybersecasia.net/wp-content/uploads/2021/08/bank2222-60x60.jpg
10824
9924
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_Zero_Trust_Secure_Remote_Access_wp-60x80.jpg
10417
9217
https://www.cybersecasia.net/wp-content/uploads/2021/09/Rising-supply-chain-ransomware-threats-drive-greater-intel-sharing-in-global-financial-industry-60x60.jpg
10100
9200
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-security-operations-maturity-model-white-paper-updated-440x264.jpg
37688
8648
https://www.cybersecasia.net/wp-content/uploads/2021/08/Role-of-biometrics-in-mitigating-security-risks-in-Asia-Pacific-60x60.jpg
9530
8630
https://www.cybersecasia.net/wp-content/uploads/2021/08/APT2-284x170.jpg
20599
8529
https://www.cybersecasia.net/wp-content/uploads/2021/07/Unifying-vulnerability-and-patch-management-in-the-WFH-era-60x60.jpg
9328
8428
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-new-CISO-mandate-protect-DevOps-60x60.jpg
9237
8337
https://www.cybersecasia.net/wp-content/uploads/2021/09/Staying-current-is-key-for-security-in-businesses1-60x60.jpg
9214
8314
https://www.cybersecasia.net/wp-content/uploads/2021/09/Ransomware-is-easy-to-deploy-now-but-so-are-defence-strategies-60x60.jpg
9112
8212
https://www.cybersecasia.net/wp-content/uploads/2021/09/How-financial-institutions-can-limit-third-party-vendor-risks-60x60.jpg
9065
8165
https://www.cybersecasia.net/wp-content/uploads/2021/09/Are-legacy-banks-equal-to-neobanks-in-application-development-security-60x60.jpg
8976
8076
https://www.cybersecasia.net/wp-content/uploads/2021/08/Knocking-down-barriers-for-a-cyber-secure-future-60x60.jpg
8904
8004
https://www.cybersecasia.net/wp-content/uploads/2021/08/Accuity-Trade-Compliance-Survey-Infographic-60x60.jpg
8877
7977
https://www.cybersecasia.net/wp-content/uploads/2021/09/Is-your-Zero-Trust-posture-true-to-the-new-digitalization-landscape-60x60.jpg
8657
7757
https://www.cybersecasia.net/wp-content/uploads/2021/08/Filling-the-gaps-in-Asias-cyber-resilience-efforts2-60x60.jpg
8546
7646
https://www.cybersecasia.net/wp-content/uploads/2021/07/ransomware-fortinet-guide-440x264.jpg
36610
7570
https://www.cybersecasia.net/wp-content/uploads/2021/09/Dealing-with-%E2%80%98vulnerability-lag-284x170.jpg
19579
7509
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_QuickGuide_2020_EnableSecureYourRemoteWorkforce-440x264.jpg
36298
7258
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-trending-phishing-techiques-white-paper-2020-440x264.jpg
36278
7238
https://www.cybersecasia.net/wp-content/uploads/2020/09/spear-phishingv4-45x45.jpg
7606
7100
https://www.cybersecasia.net/wp-content/uploads/2021/09/Rising-supply-chain-ransomware-threats-drive-greater-intel-sharing-in-global-financial-industry-440x264.jpg
35422
6382
https://www.cybersecasia.net/wp-content/uploads/2021/07/Fortinet-thumbnail-07689792-440x264.jpg
35381
6341
https://www.cybersecasia.net/wp-content/uploads/2020/09/7-benefits-of-cloud-email-security-440x264.jpg
35371
6331
https://www.cybersecasia.net/wp-content/uploads/2020/01/Parly-1-60x60.jpg
7112
6212
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-true-cost-of-free-440x264.jpg
34597
5557
https://www.cybersecasia.net/wp-content/uploads/2021/09/Love-online-flirting-and-dating-284x170.jpg
17067
4997
https://www.cybersecasia.net/wp-content/uploads/2021/09/Adopting-an-attacker-mindset-is-good-for-cybersecurity-284x170.jpg
17003
4933
https://www.cybersecasia.net/wp-content/uploads/2021/09/pegasus-spyware-final-440x264.jpg
33307
4267
Serve images in next-gen formats — Potential savings of 29,240 KiB
Consider JPEG 2000, JPEG XR or WebP image formats which provide better compression than PNG and JPEG.
URL Resource Size (Bytes) Potential Savings (Bytes)
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/phishing+kity.jpg
14776094
12431927
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/video-crowdstrike.png
1895752
1731967.95
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Veeam-thumbnail-2-fir.png
1520835
1382216.2
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Government+agency+escapes+a+cyberattack+while+trialing+an+AI+security+solution.jpg
1295421
1096253.8
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/cyber-financial.jpg
1138111
990806.1
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/image_2021_05_31T07_10_04_897Z.png
1046324
977807.6
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Veeam-thumbnail-1-sec.png
1023519
972998.1
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/online-financial.jpg
1048311
937381
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/2021/Is+there+a+rift+in+your+software+development+and+security+teams.jpg
1001792
872569.3
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/banking-fraud.jpg
989836
864944.55
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/zero-trust11.jpg
961442
809716.45
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/2021/hybrid-workplace1111.jpg
901943
763019.05
https://dgdwa0ulmobn4.cloudfront.net/wp-content/uploads/2021/03/bt-v3.jpg
857563
717092
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/rep-ossra-2021.jpg
646773
466773
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Running+outdated+software+on+your+server.jpg
724324
378724
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Callsign+-+Rethink+your+SMS+Approach.jpg
815398
363017
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Cisco-thumbnail-1-q4.jpg
522686
342686
https://www.cybersecasia.net/wp-content/uploads/2020/10/Slider_welcome_player.jpg
574586
334586
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Peril+in+a+Pandemic_032221.jpg
511569
331569
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/video-fortinet.jpg
651938
306338
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-1+copy.jpg
478847
298847
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Rubrik-socmed.jpg
635459
289859
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-3-21111.jpg
396713
216713
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/CYBERSECasia.fw.png
297045
193308
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/cs_kyocera.jpg
530207
184607
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-21111.jpg
311074
131074
https://www.cybersecasia.net/wp-content/uploads/2019/11/How-to-protect-your-business-in-the-digital-economy-440x264.jpg
122381
103021
https://www.cybersecasia.net/wp-content/uploads/2021/01/Untitled-440x264.png
116294
96934
https://www.cybersecasia.net/wp-content/uploads/2019/11/cybercrimecon-440x264.jpg
114563
95203
https://www.cybersecasia.net/wp-content/uploads/2020/09/Frost-Sullivan-Assesment-BlackBerry-White-Paper-6-22-20-440x264.png
112157
92797
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Fortinet+-+thumbnail-0017.jpg
271035
91035
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-the-state-of-the-security-team-research-report11-440x264.jpg
101532
82172
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Fortinet+-+thumbnail-001.jpg
254356
74356
https://www.cybersecasia.net/wp-content/uploads/2020/12/THUMBNAIL-TEMPLATE-paloalto-440x264.jpg
89547
70187
https://www.cybersecasia.net/wp-content/uploads/2020/08/BYLINE-CYBERSEC-copy11-440x264.jpg
87881
68521
https://www.cybersecasia.net/wp-content/uploads/2021/02/Thumbnail_LP-440x264.jpg
67682
48322
https://www.cybersecasia.net/wp-content/uploads/2021/02/Continuous-Security-Putting-it-all-Together-440x264.jpg
63874
44514
https://www.cybersecasia.net/wp-content/uploads/2021/02/AppSec-In-the-DevOps-Environment2-440x264.jpg
60281
40921
https://www.cybersecasia.net/wp-content/uploads/2021/01/prioritize2021-440x264.jpg
56076
36716
https://www.cybersecasia.net/wp-content/uploads/2021/01/Thales-thumbnail-1-440x264.jpg
55011
35651
https://www.cybersecasia.net/wp-content/uploads/2021/02/Continuous-Application-Security-with-HCL-AppScan-440x264.jpg
54160
34800
https://www.cybersecasia.net/wp-content/uploads/2021/01/Thales-thumbnail-2-440x264.jpg
54128
34768
https://www.cybersecasia.net/wp-content/uploads/2021/04/shellcode-440x264.jpg
44857
25497
https://www.cybersecasia.net/wp-content/uploads/2021/03/widget-homepage3.png
43647
20110
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-security-operations-maturity-model-white-paper-updated-440x264.jpg
37688
18328
https://www.cybersecasia.net/wp-content/uploads/2021/07/ransomware-fortinet-guide-440x264.jpg
36610
17250
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_QuickGuide_2020_EnableSecureYourRemoteWorkforce-440x264.jpg
36298
16938
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-trending-phishing-techiques-white-paper-2020-440x264.jpg
36278
16918
https://www.cybersecasia.net/wp-content/uploads/2021/09/Rising-supply-chain-ransomware-threats-drive-greater-intel-sharing-in-global-financial-industry-440x264.jpg
35422
16062
https://www.cybersecasia.net/wp-content/uploads/2021/07/Fortinet-thumbnail-07689792-440x264.jpg
35381
16021
https://www.cybersecasia.net/wp-content/uploads/2020/09/7-benefits-of-cloud-email-security-440x264.jpg
35371
16011
https://www.cybersecasia.net/wp-content/uploads/2021/07/hybrid-workplace1111-284x170.jpg
24057
16010
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-true-cost-of-free-440x264.jpg
34597
15237
https://www.cybersecasia.net/wp-content/uploads/2021/09/pegasus-spyware-final-440x264.jpg
33307
13947
https://www.cybersecasia.net/wp-content/uploads/2021/08/APT2-284x170.jpg
20599
12552
https://www.cybersecasia.net/wp-content/uploads/2020/03/HOW-SMES-CAN-QUICKLY-AND-COST-EFFECTIVELY-DEPLOY-DEFENSES-AGAINST-CYBERTHREATS-440x264.jpg
31384
12024
https://www.cybersecasia.net/wp-content/uploads/2021/08/sakura-new-440x264.jpg
31208
11848
https://www.cybersecasia.net/wp-content/uploads/2020/12/fortinet-video-440x264.jpg
31074
11714
https://www.cybersecasia.net/wp-content/uploads/2021/09/Dealing-with-%E2%80%98vulnerability-lag-284x170.jpg
19579
11532
https://www.cybersecasia.net/wp-content/uploads/2021/09/Dealing-with-%E2%80%98vulnerability-lag-440x264.jpg
30744
11384
https://www.cybersecasia.net/wp-content/uploads/2021/08/thumbnail-m1-440x264.jpg
30655
11295
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_QuickGuide_2020_EnableSecureYourRemoteWorkforce-60x80.jpg
11869
11069
https://www.cybersecasia.net/wp-content/uploads/2021/09/Staying-current-is-key-for-security-in-businesses1-440x264.jpg
30347
10987
https://www.cybersecasia.net/wp-content/uploads/2020/10/Horangi-Case-Study-Wallex-440x264.jpg
30189
10829
https://www.cybersecasia.net/wp-content/uploads/2021/04/myanmar2-60x60.jpg
11332
10732
https://www.cybersecasia.net/wp-content/uploads/2021/06/hppp333-440x264.jpg
29790
10430
https://www.cybersecasia.net/wp-content/uploads/2021/08/bank2222-60x60.jpg
10824
10224
https://www.cybersecasia.net/wp-content/uploads/2020/08/BeyondTrust_Whitepaper_Quick-Guide-Enable-Secure-Your-Remote-Workforce-440x264.jpg
29063
9703
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_Zero_Trust_Secure_Remote_Access_wp-60x80.jpg
10417
9617
https://www.cybersecasia.net/wp-content/uploads/2021/09/Rising-supply-chain-ransomware-threats-drive-greater-intel-sharing-in-global-financial-industry-60x60.jpg
10100
9500
https://www.cybersecasia.net/wp-content/uploads/2021/07/Keeping-surging-cyber-threats-at-bay-in-the-New-Normal-1-440x264.jpg
28674
9314
https://www.cybersecasia.net/wp-content/uploads/2021/09/Love-online-flirting-and-dating-284x170.jpg
17067
9020
https://www.cybersecasia.net/wp-content/uploads/2021/09/Adopting-an-attacker-mindset-is-good-for-cybersecurity-284x170.jpg
17003
8956
https://www.cybersecasia.net/wp-content/uploads/2021/01/threat-landscape-440x264.jpg
28305
8945
https://www.cybersecasia.net/wp-content/uploads/2021/08/Role-of-biometrics-in-mitigating-security-risks-in-Asia-Pacific-60x60.jpg
9530
8930
https://www.cybersecasia.net/wp-content/uploads/2021/07/Unifying-vulnerability-and-patch-management-in-the-WFH-era-60x60.jpg
9328
8728
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-new-CISO-mandate-protect-DevOps-60x60.jpg
9237
8637
https://www.cybersecasia.net/wp-content/uploads/2021/09/Staying-current-is-key-for-security-in-businesses1-60x60.jpg
9214
8614
https://www.cybersecasia.net/wp-content/uploads/2021/09/Ransomware-is-easy-to-deploy-now-but-so-are-defence-strategies-60x60.jpg
9112
8512
https://www.cybersecasia.net/wp-content/uploads/2021/09/How-financial-institutions-can-limit-third-party-vendor-risks-60x60.jpg
9065
8465
https://www.cybersecasia.net/wp-content/uploads/2021/09/Are-legacy-banks-equal-to-neobanks-in-application-development-security-60x60.jpg
8976
8376
https://www.cybersecasia.net/wp-content/uploads/2021/08/data-breaches-customer-60x60.png
8932
8332
https://www.cybersecasia.net/wp-content/uploads/2021/08/Knocking-down-barriers-for-a-cyber-secure-future-60x60.jpg
8904
8304
https://www.cybersecasia.net/wp-content/uploads/2021/08/Accuity-Trade-Compliance-Survey-Infographic-60x60.jpg
8877
8277
Reduce initial server response time — Root document took 3,120 ms
It is advised to keep the server response time short for the main document, because all other requests depend on it.
URL Time Spent (Ms)
https://www.cybersecasia.net/
3115.766
Use video formats for animated content — Potential savings of 15,667 KiB
Large GIFs are inefficient for delivering animated content. It is recommended to use MPEG4/WebM videos for animations and PNG/WebP for static images instead of GIF.
URL Resource Size (Bytes) Potential Savings (Bytes)
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/claroty3.gif
3301975
2938758
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/hillstone-gold.gif
3270699
2910922
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Homepage-DiamondSponsor-BT3.gif
3113045
2739480
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/beyondtrust-diamond.gif
2911562
2533059
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Voting-banner-final.gif
1784510
1445453
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Voting-banner-final.gif
1784510
1445453
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/final-silver-synopsys.gif
1586511
1269209
https://tpc.googlesyndication.com/simgad/14484253394520513115
672917
464313
https://tpc.googlesyndication.com/simgad/5117745255250607278
323589
194153
https://tpc.googlesyndication.com/simgad/12464120707616165329
192963
102270

Diagnostics

Avoid enormous network payloads — Total size was 61,217 KiB
Large network payloads can cost users money and are linked to long load times.
URL Transfer Size (Bytes)
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/phishing+kity.jpg
14776508
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/claroty3.gif
3302387
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/hillstone-gold.gif
3271111
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Homepage-DiamondSponsor-BT3.gif
3113457
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/beyondtrust-diamond.gif
2911974
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/video-crowdstrike.png
1896164
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Voting-banner-final.gif
1784922
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Voting-banner-final.gif
1784922
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/final-silver-synopsys.gif
1586923
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Veeam-thumbnail-2-fir.png
1521247
Serve static assets with an efficient cache policy — 68 resources found
Cybersecasia.net can speed up repeat visits by increasing the cache lifetime, which is essentially how long before a cached copy expires.
URL Cache TTL (Ms) Transfer Size (Bytes)
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/phishing+kity.jpg
0
14776508
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/claroty3.gif
0
3302387
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/hillstone-gold.gif
0
3271111
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Homepage-DiamondSponsor-BT3.gif
0
3113457
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/beyondtrust-diamond.gif
0
2911974
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/video-crowdstrike.png
0
1896164
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Voting-banner-final.gif
0
1784922
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Voting-banner-final.gif
0
1784922
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/final-silver-synopsys.gif
0
1586923
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Veeam-thumbnail-2-fir.png
0
1521247
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Government+agency+escapes+a+cyberattack+while+trialing+an+AI+security+solution.jpg
0
1295834
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/cyber-financial.jpg
0
1138524
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/online-financial.jpg
0
1048724
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/image_2021_05_31T07_10_04_897Z.png
0
1046736
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Veeam-thumbnail-1-sec.png
0
1023931
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/2021/Is+there+a+rift+in+your+software+development+and+security+teams.jpg
0
1002205
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/banking-fraud.jpg
0
990248
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/zero-trust11.jpg
0
961854
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/2021/hybrid-workplace1111.jpg
0
902355
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Callsign+-+Rethink+your+SMS+Approach.jpg
0
815810
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Running+outdated+software+on+your+server.jpg
0
724736
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/video-fortinet.jpg
0
652350
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/rep-ossra-2021.jpg
0
647157
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Rubrik-socmed.jpg
0
635871
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/cs_kyocera.jpg
0
530619
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Cisco-thumbnail-1-q4.jpg
0
523098
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Peril+in+a+Pandemic_032221.jpg
0
511953
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-1+copy.jpg
0
479259
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-3-21111.jpg
0
397125
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-21111.jpg
0
311486
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/CYBERSECasia.fw.png
0
297456
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Fortinet+-+thumbnail-0017.jpg
0
271447
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Fortinet+-+thumbnail-001.jpg
0
254768
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/sparking.jpg
0
148102
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/online-banking.jpg
0
137213
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Quick+Link.png
0
118252
https://www.cybersecasia.net/wp-content/themes/Extra/core/admin/fonts/modules/all/modules.ttf
0
92637
https://sg.popin.cc/popin_discovery/recommend?mode=new&url=https%3A%2F%2Fwww.cybersecasia.net%2F&&device=pc&media=www.cybersecasia.net&extra=mac&agency=ENCE-sg&topn=200&ad=100&r_category=all&country=sg&redirect=true&rid=000000&uid=6d0d01dc23ebe67f7801632731813167&info=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&callback=_p6_947e69c522ae
0
28358
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/MartechAsia/Featured+Images/2021/TLM-logo.svg
0
20699
https://www.cybersecasia.net/wp-content/themes/Extra/fonts/ET-Extra.woff
0
14665
https://ma.zoho.com/hub/js/WebsiteAutomation.js
0
9336
https://ma.zoho.com/hub/js/MagicPopup.js?t=1632706615994
0
7165
https://ma.zoho.com/images/videoclose.png
0
3313
https://ma.zoho.com/js/dig.js
0
2479
https://ma.zoho.com/images/challangeiconenable.jpg
0
1314
https://ma.zoho.com/wa/PopupSignUpForm?callback=processData&pType=1&popupInfoMap_Id=591128000003363013&listId=18341bc8b8e7c8bb&signupFormId=18341bc8b8fcd0bd&m=getSignupUrl&zuid=2ac5d97184e3b631c6a73058460b2a736&from=WA&ind=0
0
1059
https://r.popin.cc/log.gif?type=related-th&uid=6d0d01dc23ebe67f7801632731813167&url=https%3A%2F%2Fwww.cybersecasia.net%2F&t=1632706615011
0
308
https://api.popin.cc/popin_discovery5-min.js
3600000
43216
https://api.popin.cc/searchbox/cybersecasia.js
3600000
42685
https://api.popin.cc/td_js_sdk_171.js
3600000
13187
https://www.google-analytics.com/analytics.js
7200000
20399
https://s0.2mdn.net/879366/dfa7banner_html_inpage_rendering_lib_200_268.js
86400000
39484
https://s0.2mdn.net/879366/DcmEnabler_01_243.js
86400000
11520
https://www.gstatic.com/recaptcha/api2/logo_48.png
604800000
3127
https://www.gstatic.com/recaptcha/api2/logo_48.png
604800000
3127
https://sdki.truepush.com/sdk/v2.0.3/main.js
864000000
19234
https://sdki.truepush.com/sdk/v2.0.2/app.js
864000000
1083
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/abg_lite_fy2019.js
1209600000
8438
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/abg_lite_fy2019.js
1209600000
8438
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/abg_lite_fy2019.js
1209600000
8438
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/abg_lite_fy2019.js
1209600000
8438
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/abg_lite_fy2019.js
1209600000
8438
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/abg_lite_fy2019.js
1209600000
8438
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/client/window_focus_fy2019.js
1209600000
2161
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/client/window_focus_fy2019.js
1209600000
2161
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/client/window_focus_fy2019.js
1209600000
2161
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/client/window_focus_fy2019.js
1209600000
2161
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/client/window_focus_fy2019.js
1209600000
2161
Avoid an excessive DOM size — 2,397 elements
A large DOM (Document Object Model) will increase memory usage, cause longer system calculations as well as costly layout reflows.
Statistic Element Value
Total DOM Elements
2397
Maximum DOM Depth
24
Maximum Child Elements
76
Minimize main-thread work — 6.9 s
Main-thread work timing can be lowered by reducing the time required for parsing, compiling and executing JS. Delivering smaller JS payloads may help with this.
Category Time Spent (Ms)
Script Evaluation
3248.259
Style & Layout
1342.155
Other
1000.061
Rendering
824.25599999992
Garbage Collection
210.064
Script Parsing & Compilation
153.954
Parse HTML & CSS
152.109
Ensure text remains visible during webfont load
Make use of the font-display CSS feature, which will ensure text is user-visible while webfonts are loading.
URL Potential Savings (Ms)
https://fonts.gstatic.com/s/roboto/v18/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
3.3259999472648
https://fonts.gstatic.com/s/roboto/v18/KFOlCnqEu92Fr1MmEU9fBBc4AMP6lQ.woff2
4.4879999477416
https://fonts.gstatic.com/s/roboto/v18/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
3.9689999539405
https://fonts.gstatic.com/s/roboto/v18/KFOlCnqEu92Fr1MmEU9fBBc4AMP6lQ.woff2
3.396000014618
Avoid `document.write()`
Avoid or limit the use of external scripts that are dynamically injected via 'document.write()' as users on slow connections will be delayed by tens of seconds.
Source
Image elements do not have explicit `width` and `height`
Reduce layout shifts and improve CLS by setting explicit width and height properties on image elements.
URL Failing Elements
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/phishing+kity.jpg
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Callsign+-+Rethink+your+SMS+Approach.jpg
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/2021/Is+there+a+rift+in+your+software+development+and+security+teams.jpg
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/2021/Is+there+a+rift+in+your+software+development+and+security+teams.jpg
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Running+outdated+software+on+your+server.jpg
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/online-financial.jpg
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/zero-trust11.jpg
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/cyber-financial.jpg
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Quick+Link.png
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-21111.jpg
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-3-21111.jpg
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-21111.jpg
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Veeam-thumbnail-1-sec.png
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/online-banking.jpg
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Homepage-DiamondSponsor-BT3.gif
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/hillstone-gold.gif
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/final-silver-synopsys.gif
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/claroty3.gif
https://www.cybersecasia.net/wp-content/uploads/2021/03/widget-homepage3.png
https://www.cybersecasia.net/wp-content/uploads/2021/09/Data-protection-in-the-hybrid-work-environment-440x264.jpg
https://www.cybersecasia.net/wp-content/uploads/2021/09/pegasus-spyware-final-440x264.jpg
https://www.cybersecasia.net/wp-content/uploads/2021/09/Dealing-with-the-industrialization-of-fraud-and-scams1-440x264.jpg
https://www.cybersecasia.net/wp-content/uploads/2021/09/Dealing-with-%E2%80%98vulnerability-lag-440x264.jpg
https://www.cybersecasia.net/wp-content/uploads/2021/09/Rising-supply-chain-ransomware-threats-drive-greater-intel-sharing-in-global-financial-industry-440x264.jpg
https://www.cybersecasia.net/wp-content/uploads/2021/09/Adopting-an-attacker-mindset-is-good-for-cybersecurity-440x264.jpg
https://www.cybersecasia.net/wp-content/uploads/2021/09/Staying-current-is-key-for-security-in-businesses1-440x264.jpg
73

Accessibility

Indicates how accessible the page is and highlights opportunities where the page can be made more accessible to users of cybersecasia.net. This includes details about various page attributes that can be optimized.

Navigation

`[accesskey]` values are unique
Access keys assist users with focusing on different parts of the page. Each access key should be unique for proper navigation.
The page contains a heading, skip link, or landmark region
It is advised to provide ways to bypass repetitive content, allowing users to navigate the page efficiently.
`[id]` attributes on active, focusable elements are unique
Ensure all focusable elements have a unique id value to allow them to be visible to users of assistive technologies, like a screen reader.
No element has a `[tabindex]` value greater than 0
Although technically valid, a tabindex value greater than 0 often creates frustrating experiences for users who rely on assistive technologies.

ARIA

`[aria-*]` attributes match their roles
Avoid mismatching 'aria-*' attributes and their 'role' value, as it invalidates the attribute.
`button`, `link`, and `menuitem` elements have accessible names
Without accessible names on elements, screen readers will default to announcing a generic name, which means your content will be less accessible to users who rely on screen readers.
`[aria-hidden="true"]` is not present on the document `<body>`
If aria-hidden=true is set on the document body, assistive technologies, like a screen reader will work inconsistently.
`[aria-hidden="true"]` elements do not contain focusable descendents
Interactive elements within an aria-hidden=true element are unavailable to users of assistive technologies, like a screen reader.
ARIA input fields have accessible names
Generic names are announced to users of assistive technologies, like a screen reader, when an input field does not have an accessible name specified.
ARIA `meter` elements have accessible names
Without accessible names on elements, screen readers will default to announcing a generic name, which means your content will be less accessible to users who rely on screen readers.
ARIA `progressbar` elements have accessible names
Without accessible names on elements, screen readers will default to announcing a generic name, which means your content will be less accessible to users who rely on screen readers.
`[role]`s have all required `[aria-*]` attributes
Some ARIA roles have required 'aria-*' attributes, which provide essential information about state and functionality.
Elements with an ARIA `[role]` that require children to contain a specific `[role]` have all required children.
Some ARIA parent roles cannot perform their intended functions if specific child roles are not used.
`[role]`s are contained by their required parent element
Some ARIA child roles cannot perform their intended functions if specific parent roles are not used.
`[role]` values are valid
All ARIA roles require valid values to perform their intended functions.
ARIA toggle fields have accessible names
Generic names are announced to users of assistive technologies, like a screen reader, when a toggle field does not have an accessible name specified.
ARIA `tooltip` elements have accessible names
Without accessible names on elements, screen readers will default to announcing a generic name, which means your content will be less accessible to users who rely on screen readers.
ARIA `treeitem` elements have accessible names
Without accessible names on elements, screen readers will default to announcing a generic name, which means your content will be less accessible to users who rely on screen readers.
`[aria-*]` attributes have valid values
ARIA attributes cannot be interpreted with invalid values when used by screen readers and other assistive technologies.
`[aria-*]` attributes are valid and not misspelled
ARIA attributes cannot be interpreted with invalid names when used by screen readers and other assistive technologies.

Names and labels

Buttons have an accessible name
Buttons become unusable as they are announced simply as "button" when the button does not have an accessible name, when used by screen readers and other assistive technologies.
Document has a `<title>` element
Search engines, screen reader users and other assistive technology users rely on the title to provide an overview of the page and to help determine if the page is relevant to their search.
No form fields have multiple labels
Having multiple labels for form fields can be confusing to assistive technologies, like a screen reader.
`<frame>` or `<iframe>` elements have a title
Screen reader users and other assistive technology users rely on frame titles to describe the contents of frames.
`<input type="image">` elements have `[alt]` text
Input buttons with alternative text assist screen readers and other assistive technology users to understand its purpose.
Form elements have associated labels
Screen readers and other assistive technologies rely on labels to properly announce form controls.
`<object>` elements have `[alt]` text
It is advised that alt text is used on '<object>' elements in order to provide meaning to screen reader and other assistive technology users, as these technologies are unable to translate non-text content.

Tables and lists

`<dl>`'s contain only properly-ordered `<dt>` and `<dd>` groups, `<script>`, `<template>` or `<div>` elements.
Screen readers and other assistive technologies may produce poor and inaccurate output when definition lists are not properly marked up.
Definition list items are wrapped in `<dl>` elements
In order for screen readers and other assistive technologies to properly announce definition list items ('<dt>' and '<dd>'), they must be wrapped in parent a '<dl>' element.
Lists contain only `<li>` elements and script supporting elements (`<script>` and `<template>`).
Use proper list structure to aid screen readers and other assistive technologies.
List items (`<li>`) are contained within `<ul>` or `<ol>` parent elements
In order for screen readers to announce list items, ensure that list items ('<li>') are contained within parent '<ul>' or '<ol>' tags.
Cells in a `<table>` element that use the `[headers]` attribute refer to table cells within the same table.
Screen readers and other assistive technologies have features to make navigating tables easier. Ensure that '<td>' cells using the headers attribute only refer to other cells in the same table, to improve screen reader user experience.
`<th>` elements and elements with `[role="columnheader"/"rowheader"]` have data cells they describe.
Screen readers and other assistive technologies have features to make navigating tables easier. Ensure that table headers refer to some set of cells, to improve screen reader user experience.

Internationalization and localization

`<html>` element has a `[lang]` attribute
It is advised to provide a lang attribute so that screen readers and other assistive technologies are guaranteed to announce the page's text correctly. When not provided, the user's default language setting will be used which may cause inaccuracies.
`<html>` element has a valid value for its `[lang]` attribute
Specify a valid BCP 47 language in order to help screen readers and other assistive technologies announce text properly.
`[lang]` attributes have a valid value
Specify a valid BCP 47 language on elements in order to help screen readers and other assistive technologies announce text properly.

Best practices

The document does not use `<meta http-equiv="refresh">`
Pages that refresh automatically cause a poor user experience as focus is directed back to the top of the page unexpectedly.

Audio and video

`<video>` elements contain a `<track>` element with `[kind="captions"]`
Cybersecasia.net may provide assistance to deaf or hearing-impaired users with captions on videos.

Contrast

Background and foreground colors do not have a sufficient contrast ratio.
Many (if not most) users find low-contrast text difficult or impossible to read.
Failing Elements

ARIA

ARIA IDs are not unique
Ensure all ARIA ID values are unique to prevent elements from being overlooked by assistive technologies, like a screen reader.
Failing Elements

Navigation

Heading elements are not in a sequentially-descending order
Properly order all headers and do not skip heading levels to better the navigation and readability for users of assistive technologies, like a screen reader.
Failing Elements

Names and labels

Image elements do not have `[alt]` attributes
Provide short and descriptive alternative text where possible on informative elements.
Failing Elements
Links do not have a discernible name
In order to improve the navigation for screen reader and other assistive technology users, use link text that is unique, focusable and discernible.

Best practices

`[user-scalable="no"]` is used in the `<meta name="viewport">` element or the `[maximum-scale]` attribute is less than 5.
For users with low vision who rely on screen magnification, ensure that zooming is not disabled.
Failing Elements

Manual Checks

The page has a logical tab order
The visual layout should be logical in its tab order and users cannot focus elements that are offscreen.
Interactive controls are keyboard focusable
Ensure that custom interactive controls are keyboard focusable and that a focus indicator is displayed.
Interactive elements indicate their purpose and state
Ensure that interactive elements (such as links and buttons) are distinguishable from non-interactive elements and that they indicate their state.
The user's focus is directed to new content added to the page
When new content (such as a dialogue) is added to the page, the user's focus should be directed to it.
User focus is not accidentally trapped in a region
Avoid focus being accidentally trapped when a user tabs in and out of controls or regions on page.
Custom controls have associated labels
Ensure that custom interactive controls have associated labels, which are provided by aria-label and aria-labelledby attributes.
Custom controls have ARIA roles
Ensure that all custom interactive controls have appropriate ARIA roles.
Visual order on the page follows DOM order
Ensure that the DOM order matches with the page's visual order, in order to improve navigation for screen readers and other assistive technologies.
Offscreen content is hidden from assistive technology
Ensure that offscreen content is hidden through the use of "display:none" styling or the aria-hidden attribute.
HTML5 landmark elements are used to improve navigation
Elements such as <main> and <nav> are recommended as they are used by screen readers and other assistive technologies to improve keyboard navigation.
80

Best Practices

Indicates the recommended, best practices currently in place on the page and highlights the best practices that cybersecasia.net should incorporate. This includes practices such as protecting pages with HTTPS.

Audits

Links to cross-origin destinations are safe
Improve performance and prevent security vulnerabilities by adding rel="noopener" and rel="noreferrer" to external links.
Avoids requesting the geolocation permission on page load
When requesting a user's location, provide context or consider tying the request to a user action to avoid confusion and mistrust from users.
Avoids requesting the notification permission on page load
When requesting permission to send notifications, provide context or consider tying the request to a user action to avoid confusion and mistrust from users.
Avoids front-end JavaScript libraries with known security vulnerabilities
Ensure that the use of third-party scripts is minimal and that only trusted third-party scripts are used as some may contain known security vulnerabilities which may be exploited by attackers.
Ensure CSP is effective against XSS attacks
Significantly reduce the risk of cross-site scripting attacks (XSS) by ensuring you have a strong Content Security Policy (CSP).
Description Directive Severity
No CSP found in enforcement mode
High

Audits

Allows users to paste into password fields
Ensure that password inputs may be pasted into to aid in the user's ability to use password managers and improve security.
Displays images with correct aspect ratio
Ensure that image display dimensions match their natural aspect ratio.
Serves images with appropriate resolution
For maximum image clarity, ensure images have natural dimensions and are proportional to the display size and pixel ratio.
Fonts with `font-display: optional` are preloaded
It is recommended that optional fonts are preloaded.

Audits

Page has the HTML doctype
Ensure a doctype is specified to prevent the browser from switching to quirks-mode.
Properly defines charset
It is advised to declare a character encoding, optionally via a <meta> tag in the first 1024 bytes of the HTML or in the Content-Type HTTP response header.

Audits

Avoids Application Cache
Application cache is deprecated and is no longer recommended.
Detected JavaScript libraries
Below is a list of all front-end JavaScript libraries that were detected on the page.
Name Version
jQuery
3.6.0
Underscore
1.13.1
WordPress
5.8.1
core-js
core-js-global@3.11.0; core-js-global@3.0.1; core-js-global@3.2.1
Avoids deprecated APIs
Avoid deprecated APIs which will eventually be removed the browser.
Page has valid source maps
Consider deploying source maps for added benefits such as the ability to debug while in production.
No issues in the `Issues` panel in Chrome Devtools
There may be unresolved issues logged to Chrome Devtools.

Audits

Does not use HTTPS — 1 insecure request found
Ensure that all pages are protected with HTTPS (including those that do not handle sensitive data) as HTTPS prevents tampering and passive listening on communications between the app and its users. Additionally, HTTPS is a prerequisite for HTTP/2 and many new web platform APIs.
Insecure URL Request Resolution
http://cybersecasia.net/
Allowed

Audits

Registers an `unload` listener
The 'unload' event does not fire reliably, causing issues with browser optimizations such as the Back-Forward Cache. It is recommended that 'pagehide' or 'visibilitychange' events are used instead.
Source
Browser errors were logged to the console
Below is a list of all errors logged to the console, which indicate unresolved problems on the site.
Source Description
Failed to load resource: the server responded with a status of 404 (Not Found)
Failed to load resource: the server responded with a status of 404 (Not Found)
Failed to load resource: the server responded with a status of 404 (Not Found)
Failed to load resource: the server responded with a status of 404 (Not Found)
Failed to load resource: the server responded with a status of 404 (Not Found)
Failed to load resource: the server responded with a status of 404 (Not Found)
Failed to load resource: the server responded with a status of 404 (Not Found)
Failed to load resource: the server responded with a status of 404 (Not Found)
Failed to load resource: the server responded with a status of 404 (Not Found)
Failed to load resource: the server responded with a status of 404 (Not Found)
Failed to load resource: the server responded with a status of 404 (Not Found)
Failed to load resource: the server responded with a status of 404 (Not Found)
TypeError: e.indexOf is not a function at S.fn.init.S.fn.load (https://www.cybersecasia.net/wp-includes/js/jquery/jquery.min.js?ver=3.6.0:2:84932) at HTMLDocument.<anonymous> (https://www.cybersecasia.net/wp-content/plugins/supreme-modules-for-divi/scripts/frontend-bundle.min.js?ver=2.4.0:1:4859) at e (https://www.cybersecasia.net/wp-includes/js/jquery/jquery.min.js?ver=3.6.0:2:30038) at t (https://www.cybersecasia.net/wp-includes/js/jquery/jquery.min.js?ver=3.6.0:2:30340)
75

SEO

Indicates how well the page is optimized for ranking in search engines and highlights Search Engine Optimization (SEO) opportunities for cybersecasia.net. This includes optimizations such as providing meta data.

Mobile Friendly

Has a `<meta name="viewport">` tag with `width` or `initial-scale`
It is advised to use a '<meta name="viewport">' tag for the optimization of cybersecasia.net on mobile screens.
Document uses legible font sizes
Font sizes of 12px or less are too small to most mobile users without user gestures and further action. Aim for more than 60% of page text to use font sizes greater than 12px.
Tap targets are sized appropriately
Interactive elements (such as buttons and links) should be appropriately spaced, sized and easy enough to select or tap with regard to their surrounding elements.

Content Best Practices

Document has a `<title>` element
Search engines, screen reader users and other assistive technology users rely on the title to provide an overview of the page and to help determine if the page is relevant to their search.
Document has a meta description
Meta descriptions may be used by search engines when displaying a link to the page and should concisely summarize the page's content.
Document has a valid `hreflang`
Search engines can be instructed to list specific versions of a page for a given language or region through the use of hreflang links.
Document has a valid `rel=canonical`
Search engines can be suggested which URL should be shown in search results through the use of canonical links.
Document avoids plugins
The content of plugins cannot be indexed by search engines and many devices either restrict or do not support them.

Crawling and Indexing

Page has successful HTTP status code
Avoid pages with unsuccessful HTTP status codes as they may not be indexed by search engines.
Page isn’t blocked from indexing
Pages that cannot be crawled by search engines cannot be indexed or included in their search results. Ensure that search engines have permission to crawl all pages that should be indexed.
robots.txt is valid
Malformed robots.txt files prevent crawlers from understanding how a site wants to be crawled or indexed, which can be devastating to SEO.

Content Best Practices

Links do not have descriptive text — 4 links found
Make use of descriptive link text to assist search engines in understanding the content.
Image elements do not have `[alt]` attributes
Provide short and descriptive alternative text where possible on informative elements.
Failing Elements

Crawling and Indexing

Manual Checks

Structured data is valid
Structured data can be validated through the use of the Structured Data Testing Tool and the Structured Data Linter.
36

Progressive Web App

Indicates how valid the aspects of a Progressive Web App (PWA) are for the page and highlights opportunities to enable/improve the PWA of cybersecasia.net. This includes details about web app manifests.

PWA Optimized

Redirects HTTP traffic to HTTPS
It is advised to redirect all HTTP traffic to HTTPS, in order to enable secure web features for all users.
Content is sized correctly for the viewport
Ensure that the width of the app's content matches the width of the viewport, otherwise the app might not be optimized for mobile screens.
Has a `<meta name="viewport">` tag with `width` or `initial-scale`
It is advised to use a '<meta name="viewport">' tag for the optimization of cybersecasia.net on mobile screens.

Installable

Web app manifest or service worker do not meet the installability requirements — 1 reason
User engagement may be increased by leveraging the browsers ability to proactively prompt users to add the app to their homescreen.
Failure reason
No manifest was fetched

PWA Optimized

Does not register a service worker that controls page and `start_url`
A service worker is used to provide Progressive Web Apps the use of features such as working offline, the ability for the app to be added to the homescreen as well as push notifications.
Is not configured for a custom splash screen
Themed splash screens ensure a high-quality user experience at launch for app users.
View Data
Does not set a theme color for the address bar.
A theme may be applied to the browser address bar, which ideally can be made to match the site.
View Data
Does not provide a valid `apple-touch-icon`
iOS users of Progressive Web Apps will benefit from an apple touch icon, which can be defined with 'apple-touch-icon', which must point to a non-transparent 192px (or 180px) square PNG.
Manifest doesn't have a maskable icon
Maskable icons are great to ensure that images fill the entire shape when installing the app on a device.

Manual Checks

Site works cross-browser
Ensure that the Progressive Web App works correctly across every major browser.
Page transitions don't feel like they block on the network
Users perceive apps with responsive, snappy transitions as higher peforming and ensures a great user experience, even on a slow network.
Each page has a URL
Ensure that all pages are deep linkable via URL. They should also be unique for the purpose of shareability on social media.
Avg. (All Categories) 55
Performance 4
Accessibility 73
Best Practices 80
SEO 77
Progressive Web App 42
0–49 (Fail) 50–89 (Average) 90–100 (Pass)
Simulate loading on mobile
4

Performance

Indicates how well the page is performing and highlights opportunities where performance may be improved for cybersecasia.net. This includes details about optimizing page load times which can result in a better user experience.

Opportunities

Minify CSS — Potential savings of 2 KiB
Cascading Style Sheets (CSS) files can contribute to network payload sizes. Cybersecasia.net should consider minifying CSS files.
URL Transfer Size (Bytes) Potential Savings (Bytes)
._popIn_feed_root ._popIn_recommend_container { margin : 0 ; padding : 0px 0px 0px 0px ; ... } ...
9429
2559
Minify JavaScript — Potential savings of 16 KiB
JavaScript (JS) files can contribute to network payload sizes and increase script parse times. Cybersecasia.net should consider minifying JS files.
URL Transfer Size (Bytes) Potential Savings (Bytes)
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/pickadate/picker.js?ver=2.2.5
9608
6139
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/pickadate/picker.date.js?ver=2.2.5
10882
5895
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/pickadate/picker.time.js?ver=2.2.5
7961
4141
Enable text compression
Text-based resources should be served with compression, such as gzip, deflate or brotli.
Preconnect to required origins
Resource hints, such as 'preconnect' or 'dns-prefetch', may assist in establishing early connections to important third-party origins.
Preload key requests
Key requests can be preloaded by using '<link rel=preload>'. Cybersecasia.net should consider using '<link rel=preload>' to prioritize fetching resources that are currently requested later in page load.
Remove duplicate modules in JavaScript bundles
Ensure that no duplicate JavaScript modules from bundles exist to reduce bytes consumed by network activity.
Preload Largest Contentful Paint image
It is recommended to preload images used by LCP elements, to improve LCP time.

Diagnostics

Avoid chaining critical requests — 79 chains found
Below is a list of Critical Request Chains, which shows which resources are loaded with a high priority. Cybersecasia.net should consider reducing the length of chains, reducing the download size of resources, or deferring the download of unnecessary resources to improve page load.
User Timing marks and measures — 3 user timings
Make use of the User Timing API to measure an app's real-world performance during key user experiences.
Name Type Start Time (Ms) Duration (Ms)
gpt-tag-load
Mark
6112.437
gpt-first-ad-request
Mark
6275.917
gpt-first-ad-render
Mark
6447.048
Keep request counts low and transfer sizes small — 356 requests • 58,113 KiB
It is advised to add a budgets.json file in order to set budgets for the quantity and size of page resources.
Resource Type Requests Transfer Size (Bytes)
Total
356
59508040
Image
191
57363015
Script
82
1428738
Font
11
270799
Stylesheet
33
191106
Document
8
144467
Other
31
109915
Media
0
0
Third-party
140
54930422
Lazy load third-party resources with facades
Consider replacing third-party embeds with a facade until they are required (use lazy loading).
Largest Contentful Paint element — 1 element found
The element which was identified as the Largest Contentful Paint.
Element
Largest Contentful Paint image was not lazily loaded
Above-the-fold images that are lazily loaded render later in the page lifecycle, which can delay the largest contentful paint.
Element
Uses passive listeners to improve scrolling performance
Improve the page's scroll performance by marking touch and wheel event listeners as 'passive'.
Avoid long main-thread tasks — 20 long tasks found
Below is a list of the longest tasks on the main thread, which is useful when identifying the worst input delay contributors.
URL Start Time (Ms) Duration (Ms)
https://www.cybersecasia.net/wp-includes/js/jquery/jquery.min.js?ver=3.6.0
156248
771
https://www.cybersecasia.net/wp-includes/js/jquery/jquery.min.js?ver=3.6.0
217541
510
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__en.js
216454
404
https://www.googletagmanager.com/gtag/js?id=UA-145136419-1
216978
395
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021092001.js?31062904
163350
376
https://www.cybersecasia.net/wp-content/themes/Extra/scripts/scripts.min.js?ver=4.10.8
33092.005760193
355
https://www.cybersecasia.net/wp-includes/js/jquery/jquery.min.js?ver=3.6.0
157028
298
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__en.js
215310
296
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
2626
274
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__en.js
216161
240
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/abg_lite_fy2019.js
3281
237
https://tpc.googlesyndication.com/safeframe/1-0-38/js/ext.js
206942
217
https://www.cybersecasia.net/wp-includes/js/jquery/jquery.min.js?ver=3.6.0
14042.005760193
216
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
3072
209
https://www.cybersecasia.net/wp-includes/js/jquery/jquery.min.js?ver=3.6.0
156036
179
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__en.js
2900
172
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-scripts.min.js?ver=2.2.5
155872
164
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__en.js
215779
161
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__en.js
215606
145
https://www.cybersecasia.net/wp-content/plugins/popups-for-divi/scripts/ie-compat.min.js?ver=3.0.3
11182.005760193
143
Has a `<meta name="viewport">` tag with `width` or `initial-scale`
It is advised to use a '<meta name="viewport">' tag for the optimization of cybersecasia.net on mobile screens.

Budgets

Performance budget
It is advised to keep the quantity and size of all network requests under the targets set by the provided performance budget.
Timing budget
It is advised to set a timing budget to monitor the performance of your site.

Other

Network Requests
Below is a list of network requests that were made during page load.
URL Protocol Start Time (Ms) End Time (Ms) Transfer Size (Bytes) Resource Size (Bytes) Status Code MIME Type Resource Type
http://cybersecasia.net/
http/1.1
0
800.51900004037
317
0
301
text/html
https://cybersecasia.net/
http/1.1
801.04100005701
2228.8669999689
306
0
301
text/html
https://www.cybersecasia.net/
h2
2229.3169999029
5100.0629998744
70485
477097
200
text/html
Document
https://www.cybersecasia.net/wp-content/plugins/smart-slider-3/Public/SmartSlider3/Application/Frontend/Assets/dist/smartslider.min.css?ver=821e0c40
h2
5111.3640000112
5345.2059999108
3810
23692
200
text/css
Stylesheet
https://www.google.com/recaptcha/api.js?render=6LcOQLAUAAAAAJE6aHUcEpbVmTsNus99g_88TITd
h2
5111.5530000534
5117.7240000106
1202
884
200
text/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/wp-social/assets/css/frontend.css?ver=5.8.1
h2
5111.7219999433
5353.0359999277
6848
67426
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/wp-social/assets/css/font-icon.css?ver=5.8.1
h2
5111.8610000703
5356.708999956
7618
43781
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/add-search-to-menu/public/css/ivory-search.min.css?ver=4.6.6
h2
5112.0269999374
5355.1979998592
1975
6811
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/popups-for-divi/styles/front.min.css?ver=3.0.3
h2
5112.1379998513
5346.5199999046
1960
7647
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/themes/Extra/style.min.css?ver=4.10.8
h2
5112.3430000152
5387.6869999804
43707
365523
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/et-cache/home/et-extra-dynamic.css?ver=1632706266
h2
5114.41499996
5374.7560000047
1428
8706
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/supreme-modules-for-divi/styles/style.min.css?ver=2.4.0
h2
5114.5699999761
5598.8399998751
15157
172553
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-fonticons-ii.css?ver=2.2.5
h2
5114.7000000346
5595.1350000687
5666
41290
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-fonticons-fa.css?ver=2.2.5
h2
5115.1789999567
5376.8539999146
4837
29977
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/select2/select2.min.css?ver=4.0.13
h2
5115.3319999576
5348.1940000784
2259
14966
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-crop.css?ver=2.2.5
h2
5115.6820000615
5374.3859999813
1247
4346
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-modal.css?ver=2.2.5
h2
5115.807000082
5375.4900000058
1229
3730
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-styles.css?ver=2.2.5
h2
5116.0969999619
5576.1189998593
4488
22134
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-profile.css?ver=2.2.5
h2
5116.5449998807
5594.8280000594
2453
9981
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-account.css?ver=2.2.5
h2
5116.686000023
5578.8719998673
1427
4492
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-misc.css?ver=2.2.5
h2
5116.8100000359
5375.2800000366
999
2161
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-fileupload.css?ver=2.2.5
h2
5117.0250000432
5350.0280000735
1229
3743
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/pickadate/default.css?ver=2.2.5
h2
5118.1689999066
5594.3149998784
1478
3922
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/pickadate/default.date.css?ver=2.2.5
h2
5118.2919999119
5575.6029998884
1557
6009
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/pickadate/default.time.css?ver=2.2.5
h2
5118.4209999628
5574.4059998542
1024
2543
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-raty.css?ver=2.2.5
h2
5118.5550000519
5575.0569999218
717
1099
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/simplebar.css?ver=2.2.5
h2
5118.6710000038
5574.8000000603
1299
4010
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-tipsy.css?ver=2.2.5
h2
5119.2189999856
5598.0080000591
804
2271
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-responsive.css?ver=2.2.5
h2
5119.3599998951
5597.7459999267
2149
12865
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-old-default.css?ver=2.2.5
h2
5119.689000072
5597.4379999097
1476
6254
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/themes/TechSites/style.css?ver=1.0.0.1563178420
h2
5119.7989999782
5579.7599998768
4059
18071
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-includes/js/jquery/jquery.min.js?ver=3.6.0
h2
5119.9479999486
5827.6499998756
31177
89521
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/popups-for-divi/scripts/ie-compat.min.js?ver=3.0.3
h2
5120.7669998985
5575.3490000498
3838
9647
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/wp-social/assets/js/social-front.js?ver=5.8.1
h2
5120.9019999951
5825.8429998532
747
459
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-gdpr.min.js?ver=2.2.5
h2
5123.1670000125
5826.4279998839
581
293
200
application/javascript
Script
https://securepubads.g.doubleclick.net/tag/js/gpt.js
h2
5872.7680000011
5899.9399999157
26452
74358
200
text/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/smart-slider-3/Public/SmartSlider3/Application/Frontend/Assets/dist/n2.min.js?ver=821e0c40
h2
5123.4569998924
5596.5090000536
11696
41829
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/smart-slider-3/Public/SmartSlider3/Application/Frontend/Assets/dist/smartslider-frontend.min.js?ver=821e0c40
h2
5123.5380000435
5599.3949999101
29535
129413
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/smart-slider-3/Public/SmartSlider3/Slider/SliderType/Simple/Assets/dist/smartslider-simple-type-frontend.min.js?ver=821e0c40
h2
5124.4590000715
5827.2140000481
4783
23782
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/smart-slider-3/Public/SmartSlider3/Slider/SliderType/Simple/Assets/dist/smartslider-backgroundanimation.min.js?ver=821e0c40
h2
5124.570999993
5598.2419999782
5066
24953
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/uploads/2019/07/CYBERSECasia-logo.png
h2
5872.8539999574
6121.9569998793
2934
2637
200
image/png
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Data-protection-in-the-hybrid-work-environment-440x264.jpg
h2
5873.0359999463
6353.0969999265
27330
32195
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/pegasus-spyware-final-440x264.jpg
h2
5873.1769998558
6353.6670000758
33307
40378
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Dealing-with-the-industrialization-of-fraud-and-scams1-440x264.jpg
h2
5873.2689998578
6355.7090000249
23172
28106
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Dealing-with-%E2%80%98vulnerability-lag-440x264.jpg
h2
5873.5169998836
6301.3559998944
30744
34305
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Rising-supply-chain-ransomware-threats-drive-greater-intel-sharing-in-global-financial-industry-440x264.jpg
h2
5873.6010000575
6302.18099989
35422
38925
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/2021/Is+there+a+rift+in+your+software+development+and+security+teams.jpg
http/1.1
5873.7019998953
8971.421000082
1002205
1001792
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Dealing-with-%E2%80%98vulnerability-lag-284x170.jpg
h2
5873.7800000235
6579.7170000151
19579
23140
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Rising-supply-chain-ransomware-threats-drive-greater-intel-sharing-in-global-financial-industry-60x60.jpg
h2
5873.8509998657
6574.7899999842
10100
13680
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Running+outdated+software+on+your+server.jpg
http/1.1
5873.9569999743
8960.6429999694
724736
724324
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Adopting-an-attacker-mindset-is-good-for-cybersecurity-284x170.jpg
h2
5874.0449999459
6566.5599999484
17003
21546
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Is-your-Zero-Trust-posture-true-to-the-new-digitalization-landscape-60x60.jpg
h2
5874.1850000806
6355.1179999486
8657
13275
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Staying-current-is-key-for-security-in-businesses1-60x60.jpg
h2
5874.2750000674
6350.6710000802
9214
16951
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Are-legacy-banks-equal-to-neobanks-in-application-development-security-60x60.jpg
h2
5874.363000039
6351.0350000579
8976
14000
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Love-online-flirting-and-dating-284x170.jpg
h2
5874.4560000487
6565.6900000758
17067
20591
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/How-financial-institutions-can-limit-third-party-vendor-risks-60x60.jpg
h2
5874.6229999233
6337.4300000723
9065
13681
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Ransomware-is-easy-to-deploy-now-but-so-are-defence-strategies-60x60.jpg
h2
5875.0149998814
6127.179000061
9112
16898
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/online-financial.jpg
http/1.1
5875.1099999063
9205.9720000252
1048724
1048311
200
image/jpeg
Image
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/zero-trust11.jpg
http/1.1
5875.2399999648
8884.1510000639
961854
961442
200
image/jpeg
Image
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/online-banking.jpg
http/1.1
5875.5830000155
8501.9069998525
137213
136801
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Adopting-an-attacker-mindset-is-good-for-cybersecurity-440x264.jpg
h2
5875.7019999903
6567.0789999422
27366
31886
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-21111.jpg
http/1.1
5875.8119998965
8716.4409998804
311486
311074
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-3-21111.jpg
http/1.1
5875.9149999823
8647.8829998523
397125
396713
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Staying-current-is-key-for-security-in-businesses1-440x264.jpg
h2
5876.0299999267
6786.7260000203
30347
38022
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_QuickGuide_2020_EnableSecureYourRemoteWorkforce-440x264.jpg
h2
5876.2669998687
6597.9649999645
36298
40393
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_Zero_Trust_Secure_Remote_Access_wp-440x264.jpg
h2
5876.6389999073
6358.0000000075
27073
31746
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/thumbnail-m1-440x264.jpg
h2
5876.7460000236
6530.1989999134
30912
30655
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/Thumbnail-srei-440x264.jpg
h2
5876.8440000713
6786.0959998798
18058
17839
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-top-5-remote-access-problems-440x264.jpg
h2
5876.9459999166
6786.4049999043
21022
20882
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-true-cost-of-free-440x264.jpg
h2
5877.0510000177
6367.8559998516
34598
34597
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/sakura-new-440x264.jpg
h2
5877.1750000305
6785.4299999308
31208
35618
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/Fortinet-thumbnail-028-440x264.jpg
h2
5877.2789998911
6347.3419998772
19840
20347
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/Thumbnail-0399-440x264.jpg
h2
5877.3969998583
6344.4339998532
17411
17871
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Veeam-thumbnail-1-sec.png
http/1.1
5877.5489998516
8889.5979998633
1023931
1023519
200
image/png
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Veeam-thumbnail-2-fir.png
http/1.1
5877.6809999254
9310.6859999243
1521247
1520835
200
image/png
Image
https://www.cybersecasia.net/wp-content/uploads/2021/07/Keeping-surging-cyber-threats-at-bay-in-the-New-Normal-1-440x264.jpg
h2
5877.7699999046
6542.4520000815
28674
33197
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/07/Kemp-Thumbnail-2-440x264.jpg
h2
5877.8760000132
6368.2409999892
16712
17205
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/07/Kemp-Thumbnail-1-final-440x264.jpg
h2
5878.2969999593
6788.755999878
18112
22084
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/07/ransomware-fortinet-guide-440x264.jpg
h2
5878.4079998732
6587.7259999979
36610
40325
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/07/Fortinet-thumbnail-07689792-440x264.jpg
h2
5878.5589998588
6353.9070000406
35381
35407
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Cisco-thumbnail-1-q4.jpg
http/1.1
5878.7360000424
8682.2269998956
523098
522686
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Fortinet+-+thumbnail-0017.jpg
http/1.1
5878.9599998854
8696.4539999608
271447
271035
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/06/Guide-Thumbnail-1-440x264.jpg
h2
5879.0859999135
6836.9350000285
18690
19234
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/06/micro-virty-440x264.jpg
h2
5879.2840000242
7004.3130000122
18912
20070
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/06/hppp333-440x264.jpg
h2
5879.5069998596
6530.9089999646
29790
33315
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/04/image_2021_04_22T03_12_15_226Z-440x264.jpg
h2
5879.8149998765
6837.1820000466
14538
14694
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/06/gartners-magic-1-440x264.jpg
h2
5879.9509999808
6589.2429999076
24785
28458
200
image/jpeg
Image
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/image_2021_05_31T07_10_04_897Z.png
http/1.1
5880.0409999676
8947.2489999607
1046736
1046324
200
image/png
Image
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-1+copy.jpg
http/1.1
5880.4170000367
8709.7970000468
479259
478847
200
image/jpeg
Image
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/video-crowdstrike.png
http/1.1
5881.1200000346
9160.4339999612
1896164
1895752
200
image/png
Image
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Peril+in+a+Pandemic_032221.jpg
http/1.1
5881.2140000518
8697.2020000685
511953
511569
200
image/jpeg
Image
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/video-fortinet.jpg
http/1.1
5881.2990000006
8939.973999979
652350
651938
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/04/quantum-computing-440x264.jpg
h2
5881.3950000331
6371.9069999643
17158
17573
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/04/NTT_thumbnail-001-440x264.jpg
h2
5881.5450000111
6586.930999998
23714
24186
200
image/jpeg
Image
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Fortinet+-+thumbnail-001.jpg
http/1.1
5882.4539999478
8542.9020000156
254768
254356
200
image/jpeg
Image
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/rep-ossra-2021.jpg
http/1.1
5882.6089999638
8991.2979998626
647157
646773
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/06/Whitepaper_BlackBerry_ZeroTrust_FINAL-copy-440x264.jpg
h2
5882.6919998974
6373.9229999483
23637
23775
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/03/gartner-pulse-sec-440x264.jpg
h2
5882.8179999255
6836.483999854
14500
15083
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/04/shellcode-440x264.jpg
h2
5882.918999996
7005.9960000217
44857
51619
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/04/ransomware-on-the-Rise-440x264.jpg
h2
5883.0379999708
7166.7579999194
22908
23370
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/04/building-the-foundation-440x264.jpg
h2
5883.1710000522
7006.7129998934
16395
16917
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/03/Pulse-Secure_Thumbnail-1-440x264.jpg
h2
5883.2620000467
6604.808999924
19853
20232
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/02/AppSec-In-the-DevOps-Environment2-440x264.jpg
h2
5883.3659999073
6564.9520000443
60281
65454
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/01/Thales-thumbnail-2-440x264.jpg
h2
5883.7840000633
6834.9240000825
54128
60836
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/01/threat-landscape-440x264.jpg
h2
5883.8869999163
7006.3539999537
28305
28709
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/12/gartner-report-1-440x264.jpg
h2
5884.4399999361
7091.0479999147
863
1400
404
text/html
Image
https://www.cybersecasia.net/wp-content/uploads/2020/12/2020-ossra-report-1-440x264.jpg
h2
5884.5229998697
7091.8940000702
863
1400
404
text/html
Image
https://www.cybersecasia.net/wp-content/uploads/2021/02/Thumbnail_LP-440x264.jpg
h2
5884.5849998761
7048.3790000435
67682
73066
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/02/Continuous-Security-Putting-it-all-Together-440x264.jpg
h2
5884.6839999314
7066.5909999516
63874
69415
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/02/Continuous-Application-Security-with-HCL-AppScan-440x264.jpg
h2
5884.8029999062
7068.0140000768
54160
59758
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/01/black-440x264.jpg
h2
5884.8739999812
7067.0310000423
16209
16545
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/01/Thales-thumbnail-1-440x264.jpg
h2
5884.9760000594
7007.3790000752
55011
61615
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/01/prioritize2021-440x264.jpg
h2
5885.1699999068
6819.8249998968
56076
56310
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-the-state-of-the-security-team-research-report11-440x264.jpg
h2
5885.3179998696
7069.5799998939
101532
108365
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/01/wp-untangling-the-web-of-cloud-security-threats-440x264.jpg
h2
5885.4409998748
6569.261000026
26030
31971
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/Horangi-Whitepaper-Selecting-A-CSPM-Solution-440x264.jpg
h2
5885.5860000476
7049.8099999968
22054
22478
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/12/fortinet-video-440x264.jpg
h2
5885.7289999723
7067.6809998695
31074
31923
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/12/THUMBNAIL-TEMPLATE-paloalto-440x264.jpg
h2
5885.8389998786
6594.1689999308
89547
96291
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/12/thumbnail-1-440x264.jpg
h2
5885.9520000406
7801.9349998794
863
1400
404
text/html
Image
https://www.cybersecasia.net/wp-content/uploads/2020/11/wp_2020Malaysia-RMiT-Actionable-Compliance-Guide-440x264.jpg
h2
5886.0249998979
7895.1929998584
863
1400
404
text/html
Image
https://www.cybersecasia.net/wp-content/uploads/2020/11/QuickGuide_Endpoint_Security-440x264.jpg
h2
5886.324999854
7846.5459998697
863
1400
404
text/html
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/aag-why-cisco-security-for-sb-img-440x264.jpg
h2
5886.4060000051
7050.2829998732
18458
19386
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/11/fortinet1-440x264.png
h2
5886.4670000039
7847.1490000375
863
1400
404
text/html
Image
https://www.cybersecasia.net/wp-content/uploads/2021/01/Untitled-440x264.png
h2
5886.5239999723
7045.1020000037
116635
116294
200
image/png
Image
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-trending-phishing-techiques-white-paper-2020-440x264.jpg
h2
5886.5829999559
7049.5269999374
36278
42803
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-security-operations-maturity-model-white-paper-updated-440x264.jpg
h2
5886.6429999471
7298.7869998906
37688
43953
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/145601-Idaptive_Case_Study_New-Zealand-Avocado-440x264.jpg
h2
5886.7039999459
7049.3039998692
17519
18006
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/12/ciso-guide-to-modern-appsec-440x264.jpg
h2
5886.7609999143
7834.6239998937
863
1400
404
text/html
Image
https://www.cybersecasia.net/wp-content/uploads/2020/12/2020-esg-report-440x264.jpg
h2
5886.8149998598
7814.4559999928
863
1400
404
text/html
Image
https://www.cybersecasia.net/wp-content/uploads/2020/11/POV-teleworker-super-user-440x264.jpg
h2
5886.8909999728
7812.9879999906
863
1400
404
text/html
Image
https://www.cybersecasia.net/wp-content/uploads/2020/11/ezgif.com-gif-maker-4-440x264.webp
h2
5886.9689998683
7839.718000032
863
1400
404
text/html
Image
https://www.cybersecasia.net/wp-content/uploads/2020/11/The-pivotal-role-of-HR-in-cybersecurity-440x264.jpg
h2
5887.095999904
7911.5829998627
863
1400
404
text/html
Image
https://www.cybersecasia.net/wp-content/uploads/2020/09/7-benefits-of-cloud-email-security-440x264.jpg
h2
5887.1999999974
6593.8889998943
35371
42913
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/Horangi-Case-Study-Wallex-440x264.jpg
h2
5887.5130000524
7052.9499999247
30189
30595
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/Horangi-Case-Study-Zave-440x264.jpg
h2
5887.6439998858
6364.401999861
27294
27874
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/Gnowbe-Case-Study-440x264.jpg
h2
5887.7530000173
7053.7219999824
26730
27286
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/145609-Idaptive-Six-IT-Security-Risks-WP-EN-v1_new-440x264.jpg
h2
5889.4739998505
7053.4540000372
17043
17870
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/enterprise-firewall-5-tips-img-440x264.jpg
h2
5889.6840000525
6373.6139999237
17434
18173
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/ngfw-futureoffirewalling-wp-img-440x264.jpg
h2
5889.8320000153
7299.2439998779
15860
17167
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/145606-Idaptive-Top-Ten-Considerations-WP-EN-v1-440x264.jpg
h2
5890.4520000797
7497.5799999665
18677
19614
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/145608-Idaptive-IDaaS-Buyers-Guide-EN-v1-440x264.jpg
h2
5890.9799999092
7007.1229999885
15276
16508
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/09/Frost-Sullivan-Assesment-BlackBerry-White-Paper-6-22-20-440x264.png
h2
5891.0769999493
7277.0829999354
112493
112157
200
image/png
Image
https://www.cybersecasia.net/wp-content/uploads/2020/09/spear-phishingv4-440x264.jpg
h2
5891.3799999282
6596.7210000381
25563
32166
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/08/2020_Sensitive-data-protection-in-the-retail-card-payments-ecosystem-440x264.jpg
h2
5891.4510000031
7275.3789999988
26281
26237
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/08/2020_Jun_A-Comprehensive-Guide-to-Authentication-Technologies-and-Methods-440x264.jpg
h2
5891.5440000128
7298.2860000338
16627
17167
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/08/2020_Guide_to_Database_Encryption_guide_WP_A4_v2-440x264.jpg
h2
5891.6100000497
6373.0369999539
16589
17312
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/08/2020_JUN_CipherTrust-Manager-solution-brief-for-KMIP-Clients-440x264.jpg
h2
5891.7159999255
6593.5750000644
12384
13217
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/08/2020_Jan_ISARA-HSM-WP-v10-440x264.jpg
h2
5891.8319998775
7275.6620000582
18446
19104
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/08/BYLINE-CYBERSEC-copy11-440x264.jpg
h2
5891.9219998643
7274.8439998832
88049
87881
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/08/thumbnail_template-copy-440x264.jpg
h2
5892.0509999152
7054.3899999466
21331
21401
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/08/BeyondTrust_Whitepaper_The-Guide-to-Just-In-Time-Privileged-Access-Management-440x264.jpg
h2
5892.3049999867
6820.9430000279
22440
23232
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/08/BeyondTrust_Whitepaper_Quick-Guide-Enable-Secure-Your-Remote-Workforce-440x264.jpg
h2
5892.4769998994
7277.4640000425
29086
29063
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/07/Email-Security-Threat-Report-2020-440x264.jpg
h2
5892.6200000569
7047.8940000758
15629
15897
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/07/Cyber-AI-for-SaaS-Security_-Protecting-Your-Dynamic-Workforce-440x264.jpg
h2
5892.741000047
7046.0769999772
15988
16261
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/07/report_spear-phishing_thumbnail-440x264.jpg
h2
5892.8829999641
7277.826000005
23091
23552
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/07/Barracuda-eBook_13-email-threats_may2020_thumbnail-440x264.jpg
h2
5892.9999999236
6615.1620000601
18392
18398
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/07/beuamer-Data-Protection-Global-Report-2019_thumbnails-440x264.jpg
h2
5893.1090000551
6817.4280000385
25744
26054
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/07/apj-uda-holdings-case-study-440x264.jpg
h2
5893.4059999883
7275.896999985
22437
22617
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/07/2020-SD-WAN-Report-Public-Cloud_thumbnail-440x264.jpg
h2
5893.5769998934
6382.8660000581
20785
20893
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/06/Whitepaper_BringingOrdertoChaoswithUES_Final-copy-440x264.jpg
h2
5893.662000075
7054.6219998505
17384
17699
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/04/Skybox_Cloud_Trends_Report-images-440x264.jpg
h2
5893.727999879
6818.2830000296
14428
14692
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/04/2020_VT_Trends-Report-reduced-images-440x264.jpg
h2
5893.8130000606
6382.5280000456
18252
18233
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/04/LogRhythm-Named-a-Leader-in-2020-Gartner-SIEM-Magic-Quadrant-440x264.jpg
h2
5893.9709998667
6819.4619999267
13654
13926
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/04/The-LogRhythm-Security-Using-Security-Operations-Maturity-Model-440x264.jpg
h2
5894.0600000788
6820.7310000435
22308
22485
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/03/HOW-SMES-CAN-QUICKLY-AND-COST-EFFECTIVELY-DEPLOY-DEFENSES-AGAINST-CYBERTHREATS-440x264.jpg
h2
5894.1639999393
7055.9499999508
31616
31384
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/03/Worry-free-endpoint-protection-for-SMEs-bg-440x264.jpg
h2
5894.2549999338
7046.6769998893
9403
9498
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2019/11/How-to-protect-your-business-in-the-digital-economy-440x264.jpg
h2
5894.3749999162
7050.9529998526
122603
122381
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2019/11/cybercrimecon-440x264.jpg
h2
5894.4830000401
7049.006999936
114634
114563
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Callsign+-+Rethink+your+SMS+Approach.jpg
http/1.1
5894.5679999888
8983.8030000683
815810
815398
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/Accuity-Trade-Compliance-Survey-Infographic-60x60.jpg
h2
5894.6749998722
6614.9760000408
8877
15584
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/phishing+kity.jpg
http/1.1
5894.7570000309
10151.788000017
14776508
14776094
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/06/Guide-Thumbnail-1-60x60.jpg
h2
5894.8119999841
7045.7180000376
1902
1640
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/cyber-financial.jpg
http/1.1
5895.2589998953
9233.4000000264
1138524
1138111
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/APT2-284x170.jpg
h2
5895.3740000725
7056.6579999868
20599
27317
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/04/myanmar2-60x60.jpg
h2
5895.528000081
7050.1449999865
11332
15016
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/05/Screenshot-79-60x60.jpg
h2
5895.6190000754
7054.1189999785
1744
1486
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/01/Parly-1-60x60.jpg
h2
5895.770000061
6614.7640000563
7258
7112
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/07/hybrid-workplace1111-284x170.jpg
h2
5895.8649998531
6845.5900000408
24057
30725
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/07/Unifying-vulnerability-and-patch-management-in-the-WFH-era-60x60.jpg
h2
5895.9989999421
7054.8669998534
9328
13734
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/Filling-the-gaps-in-Asias-cyber-resilience-efforts2-60x60.jpg
h2
5896.1739998776
6848.5270000529
8546
12952
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/Knocking-down-barriers-for-a-cyber-secure-future-60x60.jpg
h2
5896.2789999787
7055.0689999945
8904
16570
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-top-5-remote-access-problems-60x60.jpg
h2
5896.3979999535
6616.2839999888
1949
1695
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/Role-of-biometrics-in-mitigating-security-risks-in-Asia-Pacific-60x60.jpg
h2
5896.5000000317
7050.4339998588
9530
17100
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/data-breaches-customer-60x60.png
h2
5896.6890000738
7050.7409998681
9242
8932
200
image/png
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-true-cost-of-free-60x60.jpg
h2
5896.7609999236
7050.6090000272
2528
2253
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/bank2222-60x60.jpg
h2
5896.8599999789
7055.3419999778
10824
14368
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-new-CISO-mandate-protect-DevOps-60x60.jpg
h2
5897.1049999818
7056.396999862
9237
13905
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Voting-banner-final.gif
http/1.1
5897.2289999947
9195.800999878
1784922
1784510
200
image/gif
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Homepage-DiamondSponsor-BT3.gif
http/1.1
5897.3119999282
9413.040000014
3113457
3113045
200
image/gif
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/hillstone-gold.gif
http/1.1
5897.3850000184
9475.5790000781
3271111
3270699
200
image/gif
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/final-silver-synopsys.gif
http/1.1
5897.5289999507
9128.0030000489
1586923
1586511
200
image/gif
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/claroty3.gif
http/1.1
5897.6380000822
9432.2919999249
3302387
3301975
200
image/gif
Image
https://dgdwa0ulmobn4.cloudfront.net/wp-content/plugins/smart-slider-3/Public/SmartSlider3/Widget/Shadow/ShadowImage/Assets/shadow/dark.png
h2
5897.7220000234
5968.9489998855
10816
10576
200
image/png
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Quick+Link.png
http/1.1
5897.8079999797
8445.9229998756
118252
117841
200
image/png
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/2021/hybrid-workplace1111.jpg
http/1.1
5897.9009999894
8895.8419999108
902355
901943
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/sparking.jpg
http/1.1
5898.0459999293
8490.8199999481
148102
147690
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Government+agency+escapes+a+cyberattack+while+trialing+an+AI+security+solution.jpg
http/1.1
5898.1490000151
9167.3969998956
1295834
1295421
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/03/widget-homepage3.png
h2
5898.7399998587
6847.0600000583
43647
43677
200
image/png
Image
https://www.cybersecasia.net/wp-content/uploads/2020/09/spear-phishingv4-45x45.jpg
h2
5898.8290000707
7051.2079999316
7606
12732
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/07/report_spear-phishing_thumbnail-45x45.jpg
h2
5898.9289999008
6846.7639998998
1229
1066
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/07/Barracuda-eBook_13-email-threats_may2020_thumbnail-45x45.jpg
h2
5899.0189998876
6846.4780000504
1289
1116
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_QuickGuide_2020_EnableSecureYourRemoteWorkforce-60x80.jpg
h2
5899.1159999277
7055.6260000449
11869
15425
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_Zero_Trust_Secure_Remote_Access_wp-60x80.jpg
h2
5899.2589998525
7056.1800000723
10417
14052
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/thumbnail-m1-80x60.jpg
h2
5899.3639999535
6846.1060000118
2542
2270
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/08/Thumbnail-srei-80x60.jpg
h2
5899.4579999708
7273.5609998927
1654
1397
200
image/jpeg
Image
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/CYBERSECasia.fw.png
http/1.1
5899.560000049
8710.859999992
297456
297045
200
image/png
Image
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/MartechAsia/Featured+Images/2021/TLM-logo.svg
http/1.1
5899.6619998943
7978.9980000351
20699
20285
200
image/svg+xml
Image
https://www.googletagmanager.com/gtag/js?id=UA-145136419-1
h2
5899.7499998659
5931.154999882
40030
98968
200
application/javascript
Script
https://sdki.truepush.com/sdk/v2.0.2/app.js
h2
5900.3280000761
5953.3369999845
1083
1126
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/add-search-to-menu/public/css/ivory-ajax-search.min.css?ver=4.6.6
h2
5829.6890000347
6069.2310000304
2418
8143
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/plugins/popups-for-divi/scripts/front.min.js?ver=3.0.3
h2
5833.4949999116
6072.7919999044
21586
66327
200
application/javascript
Script
https://www.cybersecasia.net/wp-includes/js/masonry.min.js?ver=4.2.2
h2
5866.257000016
6100.7890000474
7673
24138
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/themes/Extra/scripts/scripts.min.js?ver=4.10.8
h2
5866.6840000078
6349.9640000518
79702
296983
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/themes/Extra/core/admin/js/es6-promise.auto.min.js?ver=4.10.8
h2
5866.8760000728
6345.902999863
2976
6817
200
application/javascript
Script
https://www.google.com/recaptcha/api.js?render=6LcOQLAUAAAAAJE6aHUcEpbVmTsNus99g_88TITd&ver=4.10.8
h2
5867.0329998713
5902.8900000267
1202
884
200
text/javascript
Script
https://www.cybersecasia.net/wp-content/themes/Extra/core/admin/js/recaptcha.js?ver=4.10.8
h2
5867.1299999114
6103.487999877
1006
1696
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/themes/Extra/includes/builder/feature/dynamic-assets/assets/js/jquery.fitvids.js?ver=4.10.8
h2
5867.367999861
6107.2680000216
1635
3349
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/supreme-modules-for-divi/scripts/frontend-bundle.min.js?ver=2.4.0
h2
5867.4880000763
6351.2520000804
2858
7338
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/themes/Extra/core/admin/js/common.js?ver=4.10.8
h2
5868.209999986
6350.8440000005
860
1343
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/carousel-slider/assets/lib/select2/select2.min.js?ver=4.0.5
h2
5868.3899999596
6117.8339999169
19258
66606
200
application/javascript
Script
https://www.cybersecasia.net/wp-includes/js/underscore.min.js?ver=1.13.1
h2
5868.4920000378
6561.1109999008
7602
19076
200
application/javascript
Script
https://www.cybersecasia.net/wp-includes/js/wp-util.min.js?ver=5.8.1
h2
5868.817999959
6107.6100000646
999
1340
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-crop.min.js?ver=2.2.5
h2
5868.9319998957
6116.6590000503
5833
17151
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-modal.min.js?ver=2.2.5
h2
5869.0239998978
6560.412999941
1524
5284
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-jquery-form.min.js?ver=2.2.5
h2
5869.1539999563
6108.4660000633
5848
14763
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-fileupload.js?ver=2.2.5
h2
5869.2880000453
6561.3150000572
3705
9808
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/pickadate/picker.js?ver=2.2.5
h2
5869.3820000626
6350.439999951
9608
39643
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/pickadate/picker.date.js?ver=2.2.5
h2
5869.497000007
6560.8439999633
10882
49595
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/pickadate/picker.time.js?ver=2.2.5
h2
5869.6570000611
6562.1390000451
7961
32991
200
application/javascript
Script
https://www.cybersecasia.net/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.7
h2
5869.7780000512
6119.5489999373
2690
6406
200
application/javascript
Script
https://www.cybersecasia.net/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=3.15.0
h2
5870.2179999091
6115.83899986
6297
16470
200
application/javascript
Script
https://www.cybersecasia.net/wp-includes/js/dist/hooks.min.js?ver=a7edae857aab69d69fa10d5aef23a5de
h2
5870.3550000209
6121.3010000065
2085
5440
200
application/javascript
Script
https://www.cybersecasia.net/wp-includes/js/dist/i18n.min.js?ver=5f1269854226b4dd90450db411a12b79
h2
5870.4699999653
6114.9909999222
4150
9866
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-raty.min.js?ver=2.2.5
h2
5870.5770000815
6119.9799999595
3309
9186
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-tipsy.min.js?ver=2.2.5
h2
5870.7230000291
6561.8360000663
1892
4405
200
application/javascript
Script
https://www.cybersecasia.net/wp-includes/js/jquery/jquery.masonry.min.js?ver=3.1.2b
h2
5870.8079999778
6114.6110000554
1010
1819
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/simplebar.min.js?ver=2.2.5
h2
5870.910000056
6127.4669999257
13591
45197
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-functions.min.js?ver=2.2.5
h2
5871.0479999427
6562.5819999259
3943
14917
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-responsive.min.js?ver=2.2.5
h2
5871.4580000378
6561.6140000056
508
221
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-conditional.min.js?ver=2.2.5
h2
5871.9039999414
6573.5889999196
2648
9787
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-scripts.min.js?ver=2.2.5
h2
5872.1449999139
6579.9539999571
3603
12399
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-profile.min.js?ver=2.2.5
h2
5872.2449999768
6126.0699999984
1246
2783
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/um-account.min.js?ver=2.2.5
h2
5872.347000055
6573.824999854
1041
2771
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/add-search-to-menu/public/js/ivory-search.min.js?ver=4.6.6
h2
5872.4259999581
6301.9179999828
1502
4522
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/featured-image-from-url/includes/html/js/image.js?ver=3.7.4
h2
5872.5189999677
6574.0310000256
924
2271
200
application/javascript
Script
https://www.cybersecasia.net/wp-content/plugins/add-search-to-menu/public/js/ivory-ajax-search.min.js?ver=4.6.6
h2
5872.6079999469
6133.1179998815
20562
67533
200
application/javascript
Script
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__en.js
h2
5900.4589999095
5911.94000002
136081
347292
200
text/javascript
Script
https://www.cybersecasia.net/wp-content/themes/Extra/style.css
h2
5580.733000068
5812.2529999819
547
273
200
text/css
Stylesheet
https://www.cybersecasia.net/wp-content/uploads/2021/09/Protecting-identities-and-access-in-the-age-of-digital-banking1-440x264.jpg
h2
5918.0260000285
6848.0060000438
21715
29768
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/Automating-security-for-the-digital-economy-440x264.jpg
h2
5920.0029999483
7269.4339998998
23755
28863
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2021/09/The-future-of-digital-identities-and-digital-trust-440x264.jpg
h2
5920.18799996
7272.8939999361
23937
31861
200
image/jpeg
Image
data
5943.8090000767
5943.8789999112
0
356
200
image/svg+xml
Image
data
5944.826999912
5944.8760000523
0
184
200
image/svg+xml
Image
data
5945.9519998636
5946.0419998504
0
604
200
image/svg+xml
Image
data
5947.106000036
5947.179999901
0
568
200
image/svg+xml
Image
data
5948.5690000001
5948.6149998847
0
73
200
image/svg+xml
Image
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021092001.js?31062904
h2
5962.4069998972
5973.9999999292
121042
343839
200
text/javascript
Script
https://securepubads.g.doubleclick.net/pagead/ppub_config?ippd=www.cybersecasia.net
h2
5965.0779999793
5970.5669998657
1053
80
200
application/json
XHR
https://dgdwa0ulmobn4.cloudfront.net/wp-content/uploads/2021/03/bt-v3.jpg
h2
5974.663999863
6212.7930000424
857571
865944
200
image/jpeg
Image
https://dgdwa0ulmobn4.cloudfront.net/wp-content/uploads/2020/10/Slider_welcome_player.jpg
h2
5974.9129998963
6181.9479998667
574824
593075
200
image/jpeg
Image
https://www.cybersecasia.net/wp-content/uploads/2020/10/Slider_welcome_player.jpg
h2
5975.2710000612
7496.6559999157
574586
593075
200
image/jpeg
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Rubrik-socmed.jpg
http/1.1
5975.6060000509
9030.9480000287
635871
635459
200
image/jpeg
Image
data
6021.7790000606
6021.8559999485
0
72
200
image/svg+xml
Image
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/beyondtrust-diamond.gif
http/1.1
6041.584999999
9421.1059999652
2911974
2911562
200
image/gif
Image
https://api.popin.cc/searchbox/cybersecasia.js
http/1.1
6094.4880000316
7236.6829998791
42685
193603
200
text/javascript
Script
https://www.cybersecasia.net/wp-content/themes/Extra/fonts/ET-Extra.woff
h2
6191.3020000793
6569.9199999217
14665
14428
200
font/woff
Font
https://adservice.google.com/adsid/integrator.js?domain=www.cybersecasia.net
h2
6197.0500000753
6202.6939999778
785
107
200
application/javascript
Script
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2338046877300969&correlator=721631712214587&output=ldjh&impl=fif&eid=31062862%2C31062904%2C31060032%2C31062312&vrg=2021092001&ptt=17&sc=1&sfv=1-0-38&ecs=20210927&iu_parts=21849235607%2Cg27rlm3u5m&enc_prev_ius=%2F0%2F1&prev_iu_szs=468x60%7C1x1&cookie_enabled=1&bc=31&abxe=1&lmt=1632706687&dt=1632706687512&dlt=1632706686383&idt=1005&frm=20&biw=360&bih=640&oid=2&adxs=0&adys=70&adks=987083847&ucis=1&ifi=1&u_his=2&u_h=640&u_w=360&u_ah=640&u_aw=360&u_cd=24&u_sd=2.625&u_tz=-420&flash=0&url=https%3A%2F%2Fwww.cybersecasia.net%2F&vis=1&dmc=8&scr_x=0&scr_y=0&psz=360x0&msz=360x0&ga_vid=442695343.1632706688&ga_sid=1632706688&ga_hid=822660840&ga_fc=false&fws=4&ohw=360&btvi=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCxudWxsXQ..
h2
6275.0309999101
6308.4899999667
1331
451
200
text/plain
XHR
https://d0f71b9dc2f46b4ba84b44b161484ad3.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
h2
6281.5819999669
6294.4700000808
3958
6094
200
text/html
Document
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2338046877300969&correlator=721631712214587&output=ldjh&impl=fif&eid=31062862%2C31062904%2C31060032%2C31062312&vrg=2021092001&ptt=17&sc=1&sfv=1-0-38&ecs=20210927&iu_parts=21849235607%2CoOuEGkMO0b&enc_prev_ius=%2F0%2F1&prev_iu_szs=320x50%7C1x1&cookie_enabled=1&bc=31&abxe=1&lmt=1632706687&dt=1632706687521&dlt=1632706686383&idt=1005&frm=20&biw=360&bih=640&oid=2&adxs=16&adys=92&adks=3832183008&ucis=2&ifi=2&u_his=2&u_h=640&u_w=360&u_ah=640&u_aw=360&u_cd=24&u_sd=2.625&u_tz=-420&flash=0&url=https%3A%2F%2Fwww.cybersecasia.net%2F&vis=1&dmc=8&scr_x=0&scr_y=0&psz=352x0&msz=352x0&ga_vid=442695343.1632706688&ga_sid=1632706688&ga_hid=822660840&ga_fc=false&fws=0&ohw=0&btvi=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCxudWxsXQ..
h2
6281.2179999892
6333.4699999541
16085
37170
200
text/plain
XHR
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2338046877300969&correlator=721631712214587&output=ldjh&impl=fif&eid=31062862%2C31062904%2C31060032%2C31062312&vrg=2021092001&ptt=17&sc=1&sfv=1-0-38&ecs=20210927&iu_parts=21849235607%2CYykoBVSiQU&enc_prev_ius=%2F0%2F1&prev_iu_szs=300x250%7C1x1&cookie_enabled=1&bc=31&abxe=1&lmt=1632706687&dt=1632706687526&dlt=1632706686383&idt=1005&frm=20&biw=360&bih=640&oid=2&adxs=0&adys=1061&adks=280863058&ucis=3&ifi=3&u_his=2&u_h=640&u_w=360&u_ah=640&u_aw=360&u_cd=24&u_sd=2.625&u_tz=-420&flash=0&url=https%3A%2F%2Fwww.cybersecasia.net%2F&vis=1&dmc=8&scr_x=0&scr_y=0&psz=352x0&msz=352x0&ga_vid=442695343.1632706688&ga_sid=1632706688&ga_hid=822660840&ga_fc=false&fws=0&ohw=0&btvi=1&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCxudWxsXQ..
h2
6281.7979999818
6315.5590000097
1332
452
200
text/plain
XHR
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2338046877300969&correlator=721631712214587&output=ldjh&impl=fif&eid=31062862%2C31062904%2C31060032%2C31062312&vrg=2021092001&ptt=17&sc=1&sfv=1-0-38&ecs=20210927&iu_parts=21849235607%2C3nqwr85Ze4&enc_prev_ius=%2F0%2F1&prev_iu_szs=342x192%7C1x1&cookie_enabled=1&bc=31&abxe=1&lmt=1632706687&dt=1632706687531&dlt=1632706686383&idt=1005&frm=20&biw=360&bih=640&oid=2&adxs=-12245933&adys=-12245933&adks=4048702381&ucis=4&ifi=4&u_his=2&u_h=640&u_w=360&u_ah=640&u_aw=360&u_cd=24&u_sd=2.625&u_tz=-420&flash=0&url=https%3A%2F%2Fwww.cybersecasia.net%2F&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x0&msz=0x0&ga_vid=442695343.1632706688&ga_sid=1632706688&ga_hid=822660840&ga_fc=false&fws=132&ohw=360&btvi=-1&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCxudWxsXQ..
h2
6283.6499998812
6330.1530000754
9716
19845
200
text/plain
XHR
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2338046877300969&correlator=721631712214587&output=ldjh&impl=fif&eid=31062862%2C31062904%2C31060032%2C31062312&vrg=2021092001&ptt=17&sc=1&sfv=1-0-38&ecs=20210927&iu_parts=21849235607%2Cdh8zvdelym&enc_prev_ius=%2F0%2F1&prev_iu_szs=300x250%7C1x1&cookie_enabled=1&bc=31&abxe=1&lmt=1632706687&dt=1632706687544&dlt=1632706686383&idt=1005&frm=20&biw=360&bih=640&oid=2&adxs=30&adys=4783&adks=951038268&ucis=5&ifi=5&u_his=2&u_h=640&u_w=360&u_ah=640&u_aw=360&u_cd=24&u_sd=2.625&u_tz=-420&flash=0&url=https%3A%2F%2Fwww.cybersecasia.net%2F&vis=1&dmc=8&scr_x=0&scr_y=0&psz=360x0&msz=360x0&ga_vid=442695343.1632706688&ga_sid=1632706688&ga_hid=822660840&ga_fc=false&fws=4&ohw=360&btvi=2&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCxudWxsXQ..
h2
6283.9059999678
6347.8270000778
15532
37357
200
text/plain
XHR
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2338046877300969&correlator=721631712214587&output=ldjh&impl=fif&eid=31062862%2C31062904%2C31060032%2C31062312&vrg=2021092001&ptt=17&sc=1&sfv=1-0-38&ecs=20210927&iu_parts=21849235607%2CwCvAivJMwm&enc_prev_ius=%2F0%2F1&prev_iu_szs=300x250%7C1x1&cookie_enabled=1&bc=31&abxe=1&lmt=1632706687&dt=1632706687546&dlt=1632706686383&idt=1005&frm=20&biw=360&bih=640&oid=2&adxs=30&adys=5183&adks=593995196&ucis=6&ifi=6&u_his=2&u_h=640&u_w=360&u_ah=640&u_aw=360&u_cd=24&u_sd=2.625&u_tz=-420&flash=0&url=https%3A%2F%2Fwww.cybersecasia.net%2F&vis=1&dmc=8&scr_x=0&scr_y=0&psz=360x0&msz=360x0&ga_vid=442695343.1632706688&ga_sid=1632706688&ga_hid=822660840&ga_fc=false&fws=4&ohw=360&btvi=3&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCxudWxsXQ..
h2
6284.0189998969
6336.8379999883
15594
37523
200
text/plain
XHR
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2338046877300969&correlator=721631712214587&output=ldjh&impl=fif&eid=31062862%2C31062904%2C31060032%2C31062312&vrg=2021092001&ptt=17&sc=1&sfv=1-0-38&ecs=20210927&iu_parts=21849235607%2Cwa893eb31g&enc_prev_ius=%2F0%2F1&prev_iu_szs=300x250%7C1x1&cookie_enabled=1&bc=31&abxe=1&lmt=1632706687&dt=1632706687549&dlt=1632706686383&idt=1005&frm=20&biw=360&bih=640&oid=2&adxs=30&adys=6614&adks=1432486356&ucis=7&ifi=7&u_his=2&u_h=640&u_w=360&u_ah=640&u_aw=360&u_cd=24&u_sd=2.625&u_tz=-420&flash=0&url=https%3A%2F%2Fwww.cybersecasia.net%2F&vis=1&dmc=8&scr_x=0&scr_y=0&psz=360x0&msz=360x0&ga_vid=442695343.1632706688&ga_sid=1632706688&ga_hid=822660840&ga_fc=false&fws=4&ohw=360&btvi=4&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCxudWxsXQ..
h2
6284.1260000132
6332.6000000816
1325
452
200
text/plain
XHR
https://marketinghub.zoho.com/hub/js/WebsiteAutomation.js
http/1.1
6288.1040000357
6680.8380000293
308
0
301
text/html
https://www.cybersecasia.net/wp-includes/css/dist/block-library/style.min.css?ver=5.8.1
h2
6295.008999994
7011.7969999555
10714
80574
200
text/css
Stylesheet
https://fonts.gstatic.com/s/roboto/v29/KFOmCnqEu92Fr1Mu7GxK.woff2
h2
6324.1019998677
6328.6349999253
23343
22376
200
font/woff2
Font
https://fonts.gstatic.com/s/roboto/v29/KFOlCnqEu92Fr1MmWUlfChc4.woff2
h2
6325.4759998526
6329.4689999893
23531
22564
200
font/woff2
Font
https://fonts.gstatic.com/s/roboto/v29/KFOlCnqEu92Fr1MmSU5fChc4.woff2
h2
6329.0969999507
6333.5799998604
23403
22436
200
font/woff2
Font
https://sdki.truepush.com/sdk/version.json
h2
6368.7559999526
6468.0039999075
713
176
200
application/json
XHR
https://d0f71b9dc2f46b4ba84b44b161484ad3.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
h2
6444.3649998866
6454.3560000602
3966
6094
200
text/html
Document
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvuBHmirgTd9cNF2sSuOQNZH1DxtmSC5VmxWabdZTQIENrX6glq4nrvdjesJLMmkZb8Pb6CsLYBUYz5gy4VJMntdtnlbZuyX03b2PRuA-GlPiovPHKMdTGV1m5XLYGiIjeserJI12zG2ZR7hJiVTnPOnTdzfodepmwTIHb1ftKhJC5v1KqrXGfusdLNAtmyinuCdOU0UUMClOAtYHQtwLHnP6E1F2e_AiBNllB9EMGFxxarUKWT3T-UsXSChFYwIKvB0UgqBR0mF4Ax9g7tvCXkiA-LYNFOCD3u_TD2vEkXCkdgbhc9fASKFD7TKk_M&sai=AMfl-YTWN7ny3ue_9x4dZxJYgGfe6sx7LREKyeyDa0SEoYWd1NVFogac47PeiCNGWdU7XBIKiJuqcXkHF3KA6KoYiBYqFiKcC8dWrEhFIEcfmKelcCnZYb8OgVYBYnj08Mx9&sig=Cg0ArKJSzEK-DBVYHrhqEAE&adurl=
h2
6529.8949999269
6886.8139998522
1174
0
200
image/gif
Fetch
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/abg_lite_fy2019.js
h2
6532.0460000075
6536.7369998712
8376
18724
200
text/javascript
Script
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/client/window_focus_fy2019.js
h2
6532.1519998834
6535.8659999911
2160
2617
200
text/javascript
Script
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
h2
6532.4709999841
6543.6779998709
40621
131328
200
text/javascript
Script
https://tpc.googlesyndication.com/simgad/69705360424254951
h2
6536.3069998566
6622.8910000063
7665
6790
200
image/jpeg
Image
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvTbqdTApq_Io7XVoofmucTMMwu47fCn5x3TsynP83pmgJB7s5av8gvCMHJaUGfkAVGeWGBQGIKtNLhn-HEZqBl0a1DwfPZBPlQOOljJmovfoaGWvIY8AkYJFF-eUtPiGrOj5Rom-h4eKCHlooR_xTUHmWRNWgOlzN3yI-xQa-oj4xe-eGdpPHrA1IegFmlWkAgLIyw_2dKEPmkPfCOxsOBHOFnA9yaDtzzLW7TR_YEu80WYQXMpbU_a6BAa1uFtkGKoZxIXuC9RaIyVExIOJN3geRsCK83OlWmfaZ0Kw-8GCW3mzgFheXka02DxkLh&sai=AMfl-YTUsAXfGvjda7X_RRuLSsyVCRDlYwgzTl_LO0JNXVy2jB93YI8VBs0ZJHzCZzVnWwbLxZF3bU2zZtIh1xViw__S3DI6mogszUA39DDvdWgFXExz9Wcc13rwLC8wbl0&sig=Cg0ArKJSzO1PgcAV1rXZEAE&adurl=
h2
6565.4179998673
6916.922000004
751
0
200
image/gif
Fetch
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/abg_lite_fy2019.js
h2
6568.2880000677
6580.1689999644
8438
18724
200
text/javascript
Script
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/client/window_focus_fy2019.js
h2
6568.4380000457
6572.7750000078
2161
2617
200
text/javascript
Script
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
h2
6568.5049998574
6580.84900002
40621
131328
200
text/javascript
Script
https://www.google.com/ads/measurement/l?ebcid=ALh7CaQmKKCbOJL4erXrwUSeo-1XUBOJsZBouALOxJgnKAS9-2czACAipVjvHJAElbauxeKUd6UY9V2NdPPX4yUT3NjyKTwvKw
h2
6568.5799999628
6580.3650000598
406
0
204
text/html
Image
https://tpc.googlesyndication.com/simgad/16114196715356795834
h2
6569.5579999592
6630.8780000545
34052
33176
200
image/jpeg
Image
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsu8TAR33kxEUONpxcKtmIMX_M9LWblI-99u3_61HMfJVdvfV6GEAM7Z3AEXjl1jxVYdrnN9WfZxl2fgDnIBGXoaTsWLn-1Aj9VqUOpkStMm2EQ_ZNStQOJv0bCyAJNQEq56gj5EtgB_WOQYt1lJ4Lx-C0Xr77fyEdpi3f-vM_Hc5EDLERi0wqVY72MgaFaLEVw4KQBeGIAb6flEf7t_04n-QzWdUM0SY4NM695SQgv_Ll3VtWKtLnD1AbU8Sh5HqtUzR-azjSomDJ6jxMCwoKK_egtccBuUdW1mTJotNoIVq2tw2kmDdckZdp8kOxUa&sai=AMfl-YT8gEnpaA4hVVSkbcDfxKyMu24f9nXDhyFK83MZmD6DvKJwpnhuxRdX4ShsZZC5ktpF2gKoSIK7DsRLgE1yvGpdtPf0puEvXDbL450qX6MMXVPRcKKldH_VPtdxyBDi&sig=Cg0ArKJSzI2ZbIMor1NJEAE&adurl=
h2
6606.1629999895
7145.9259998519
751
0
200
image/gif
Fetch
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/abg_lite_fy2019.js
h2
6606.3979999162
6614.41499996
8438
18724
200
text/javascript
Script
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/client/window_focus_fy2019.js
h2
6606.466999976
6611.3299999852
2161
2617
200
text/javascript
Script
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
h2
6606.7540000658
6616.6930000763
38830
125370
200
text/javascript
Script
https://tpc.googlesyndication.com/simgad/5423342577657782387
h2
6606.9080000743
6620.2300000004
617042
616166
200
image/gif
Image
https://www.google-analytics.com/analytics.js
h2
6642.3889999278
6650.1750000753
20399
49529
200
text/javascript
Script
https://sdki.truepush.com/sdk/v2.0.3/main.js
h2
6660.4669999797
6695.5130000133
19234
81130
200
application/javascript
Script
https://ma.zoho.com/hub/js/WebsiteAutomation.js
http/1.1
6687.1549999341
6994.8739998508
9329
36879
200
application/javascript
Script
https://fonts.gstatic.com/s/roboto/v29/KFOlCnqEu92Fr1MmYUtfChc4.woff2
h2
6970.2979999129
6973.7960000057
23395
22428
200
font/woff2
Font
https://fonts.gstatic.com/s/roboto/v29/KFOlCnqEu92Fr1MmEU9fChc4.woff2
h2
6976.2869998813
6980.671999976
23513
22548
200
font/woff2
Font
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LcOQLAUAAAAAJE6aHUcEpbVmTsNus99g_88TITd&co=aHR0cHM6Ly93d3cuY3liZXJzZWNhc2lhLm5ldDo0NDM.&hl=en&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=61t57hwk53ef
h2
6994.354999857
7025.8019999601
20814
41025
200
text/html
Document
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LcOQLAUAAAAAJE6aHUcEpbVmTsNus99g_88TITd&co=aHR0cHM6Ly93d3cuY3liZXJzZWNhc2lhLm5ldDo0NDM.&hl=en&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=yb6x031l7bcw
h2
7001.2969998643
7023.2929999474
20741
40913
200
text/html
Document
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssULbRD96ip6CJ9ud2PCaxdRtBpvpf7M9uy5FAXDgPt7atyfWwyaVbKFj5-wrcaFriBM4mtoemODonQvcSt4w35MZZ4DN1fm_rkLfHOvdPN7OGElWV0yKJpMsr-sFqUCNZhkHslyM_UPMgssC7ZwHh20Bi8_z-rqzCGsT3rl_cMKHZBWtERDUrKVJlgIU6y7fAqisQMUHIU8TKmWOvfG95WXdR9t8GuYwzH9zch7npQ7Cc2TmDsP0Ct8fGq0zdnppzd5lkBfCGLUktP75zp6twAoNkxdZPyv2wyBP7pxtSqoN75OEpQDu_I13WK49lSIRw&sai=AMfl-YT_rRBoMnUZfgLjS5-8dL6vF98h5lGdzGwdoPhTzSykEeiS_gFlM-4b3Bo4v-JkK5yf1SccEKWK5-vEMXzPGW0mdcETH5_kvl6zR4Kua7MDhTsnpTcR59RqzlkxeZY&sig=Cg0ArKJSzF2tknYbH_lnEAE&adurl=
h2
7080.6080000475
8094.8850000277
1002
0
200
image/gif
Fetch
data
7083.6419998668
7083.7059998885
0
213
200
image/png
Image
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsssm3psbmSx9Qfj5nCeDsz0prtF11ktmuzbUdY81Qqc2QundljSP1Zbb35V3qjscElK9OVX93ztUL7p4aY9gY65OfXJ1mfhKtPc9AOQ9GDvitXfETy4cDeCrqXpXZwopMrmR0ZAcGXt5EPdQkPo8IDPZpA5ulG4F1EzyqKxZajUtvVdAcFSfmNfCVk7pmWBP5iVijxzuAA5R7EgcyCyi9RLTubeYAlJGFKZ8CzgZdbuxvRMlQNSm-JT7WLBeZMgiQuduRsTsUeW_0zSYxJZ21hiEDbGDYLBVETZSeXqEOcbKyrSTfFQwBcXkrCo_2MlNxM&sai=AMfl-YQIbGbi2ZTy1rJbWa9vxjO-9olpH9F4cz-JmYWpzX1pPKVBRdPZaS1J5S541jn6efzHahvuTjjHm_IdWTulCTu0pdLcdQekYFSrZoY0FbAp--Z-OOhoGUhjP-KKF2ea&sig=Cg0ArKJSzHZV0O9HXb4NEAE&adurl=
h2
7195.7469999325
8101.8999998923
1002
0
200
image/gif
Fetch
data
7199.1230000276
7199.2200000677
0
213
200
image/png
Image
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvLKh53K56oCpJJT0hvXyyBImKFXOIGZxGmdyus6gMVNrSL1l52RJvbVnV_aPAKkQWzKGNvc-uT5mdi_hf8UjQCxO45nJxEhk6zlNwm9OcJeVz7xDKcm40h4U0kHU2NWpPiflUGblTlmletnF96iI4iY0T6X3P38mJOTdwbprdG2ic58sZ8Ww-1V-UUoscguc0OsRpx0ocm2JAa-k9lOmXFzEp0Ut4rLRf5LF3rM3tNdaHUg3U9cd2G3NFoZyv822l9yksMRQZXhsgUPQgy3k2Cmzsu0I2Q2iibijxVxpA173kyRvMD_0J-Pf9uKN130ho&sai=AMfl-YS38Z7U766VgRZC4gNOecT0Y11th58fRshR4-0D81RAzt-v3-LGx8uAHSpaVHQO_bLBh65j4IHlO3SRparmxb-7GCvAhWKP30nSZVIs80tJwa12_rjW_O21M_GcU2Bv&sig=Cg0ArKJSzFKnrog6h2uNEAE&adurl=
h2
7256.9589999039
8105.3939999547
1002
0
200
image/gif
Fetch
data
7260.7229999267
7260.8199999668
0
218
200
image/png
Image
https://www.cybersecasia.net/wp-content/themes/Extra/core/admin/fonts/modules/all/modules.ttf
h2
7415.6319999602
7645.0519999489
92637
92400
200
font/ttf
Font
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/abg_lite_fy2019.js
h2
7868.9200000372
7872.7480000816
8438
18724
200
text/javascript
Script
https://tpc.googlesyndication.com/safeframe/1-0-38/js/ext.js
h2
7869.3339999299
7873.2030000538
7889
23011
200
text/javascript
Script
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
h2
7869.6789999958
7878.3110000659
40621
131328
200
text/javascript
Script
https://www.google-analytics.com/j/collect?v=1&_v=j93&a=822660840&t=pageview&_s=1&dl=https%3A%2F%2Fwww.cybersecasia.net%2F&ul=en-us&de=UTF-8&dt=CybersecAsia%20%7C%20Asia%27s%20most%20trusted%20enterprise%20cybersecurity%20information%20portal&sd=24-bit&sr=360x640&vp=360x640&je=0&_u=YAhAAUABAAAAAC~&jid=57104451&gjid=577097669&cid=442695343.1632706688&tid=UA-145136419-1&_gid=1136837572.1632706689&_r=1&gtm=2ou9m0&z=1673252314
h2
7893.3870000765
7897.1170000732
646
2
200
text/plain
XHR
https://sdk.truepush.com/api/v2/truepushSDKPlatfromDetails
http/1.1
10427.021000069
12745.725000044
1952
1446
200
application/json
XHR
https://sdk.truepush.com/api/v2/truepushSDKPlatfromDetails
http/1.1
8095.1769999228
10426.309000002
357
0
204
Preflight
https://api.popin.cc/td_js_sdk_171.js
http/1.1
8116.4770000614
9578.8650000468
13187
34497
200
text/javascript
Script
https://sg.popin.cc/popin_discovery/recommend?mode=new&url=https%3A%2F%2Fwww.cybersecasia.net%2F&&device=mobile&media=www.cybersecasia.net&extra=android&agency=ENCE-sg&topn=200&ad=100&r_category=all&country=sg&redirect=true&rid=000000&uid=68fd96f846172df68fc1632731889401&info=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&callback=_p6_947e6a397570
http/1.1
8127.7719999198
9174.2370000575
23933
114786
200
application/javascript
Script
https://api.popin.cc/popin_discovery5-min.js
http/1.1
8128.4610000439
9950.800999999
43216
155594
200
application/javascript
Script
https://stats.g.doubleclick.net/j/collect?t=dc&aip=1&_r=3&v=1&_v=j93&tid=UA-145136419-1&cid=442695343.1632706688&jid=57104451&gjid=577097669&_gid=1136837572.1632706689&_u=YAhAAUAAAAAAAC~&z=1654906502
h2
8131.6680000164
8136.4400000311
718
1
200
text/plain
XHR
https://maillist-manage.com/wa/ActionLogger?callback=processData&webAutoId=27218d28c96aa859e529e5bdf4a9ccfb6&zuid=2ac5d97184e3b631c6a73058460b2a736&domain=2a8d665163b105b383759cab4da946a376a73058460b2a736&orgDomainId=2ea4fb3d57d695ac93527561a82ffdb4140fbf6cd35f5c50c&reqType=0&ref=&socialshare=null&value=CybersecAsia%20%7C%20Asia%27s%20most%20trusted%20enterprise%20cybersecurity%20information%20portal&action=viewed&url=https%3A%2F%2Fwww.cybersecasia.net%2F&parentUrl=https%3A%2F%2Fwww.cybersecasia.net%2F
http/1.1
8215.4459999874
8827.9140000232
2182
730
200
application/javascript
Script
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/styles__ltr.css
h2
8263.459000038
8273.1180000119
26679
52867
200
text/css
Stylesheet
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__en.js
h2
8263.6110000312
8274.6449999977
135878
347292
200
text/javascript
Script
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/styles__ltr.css
h2
8264.9580000434
8280.5540000554
26477
52867
200
text/css
Stylesheet
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__en.js
h2
8265.0859998539
8274.1610000376
136081
347292
200
text/javascript
Script
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsubpz_gwuN-zvG2bS17V_jkdqqhNnCpuKXqgqP-pd_OnxzYHN-f9oHKhgiyAoxY4_9bOfUJSJWjd8AoTNjtYq2W2QKM50a_YyH8jvbobdMrwiZHaQvK&sig=Cg0ArKJSzGdnqRayZU6_EAE&id=lidar2&mcvt=1009&p=0,0,50,320&asp=510,16,560,336&mtos=1009,1009,1009,1009,1009&tos=1009,0,0,0,0&v=20210922&bin=7&avms=nio&bs=360,640&mc=1&app=0&itpl=3&adk=3832183008&rs=4&met=mue&la=0&cr=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCxudWxsXQ%3D%3D&vs=4&eosm=0&rst=1632706687796&rpt=735&isd=0&lsd=0&r=v
h2
8277.4399998598
8281.6939998884
722
42
200
image/gif
Fetch
https://s0.2mdn.net/879366/dfa7banner_html_inpage_rendering_lib_200_268.js
h2
8282.3069998994
8288.5839999653
39484
111171
200
text/javascript
Script
https://www.gstatic.com/recaptcha/api2/logo_48.png
h2
8432.8149999492
8435.4379998986
3127
2228
200
image/png
Image
https://fonts.gstatic.com/s/roboto/v18/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
h2
8434.0419999789
8436.6800000425
11506
10748
200
font/woff2
Font
https://fonts.gstatic.com/s/roboto/v18/KFOlCnqEu92Fr1MmEU9fBBc4AMP6lQ.woff2
h2
8434.8819998559
8438.1929999217
11546
10788
200
font/woff2
Font
https://www.gstatic.com/recaptcha/api2/logo_48.png
h2
8496.8699999154
8499.7989998665
3127
2228
200
image/png
Image
https://fonts.gstatic.com/s/roboto/v18/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
h2
8497.4239999428
8500.8620000444
11714
10748
200
font/woff2
Font
https://fonts.gstatic.com/s/roboto/v18/KFOlCnqEu92Fr1MmEU9fBBc4AMP6lQ.woff2
h2
8497.7239998989
8500.4419998731
11546
10788
200
font/woff2
Font
https://s0.2mdn.net/dfp/1890797/4788317706/1630555304007/index.html
h2
8537.1679998934
8550.7829999551
17138
58235
200
text/html
Document
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsu-jkzQxZkhCHKU_UTE8lJtWkd8_apKMUy56YrE4R57NkdAPC4Xf6yRKJqq3ffEmEO2EjEyP8dMrpkbqebmBmwvq3qURJflE1CpBgcCi7Yj6zFC2PxZEcbXoFDmgqrl9M6JQx5JTrbdRkKY-1eNqA54DfHs7D76OdlvQ_uqTswwrE1nvlt2O2FxkkVBvGX9jSkYlf7iuHVbNbil6Ow9Op7KgCgOoNPa6mgvem05BTNhL65QKAdd7bO2GlpSKZ6Kh00lLKDemWz-OoxWVBrQmVhaci1PezHVUvcJryRB2-nJF4CAVRsMbuasdyLy2yEn&sai=AMfl-YTLOSTWtFiH5PUmYAGC3TrR8PAJYO7s79WSM9vfyXvQjAsthw613PK7zXju780TD-bpc4Hex79VMlWXwzH2S7SjQdGKcJvSft1EL3yhjDJfIwomPWkSmm7XiV2DCBXQ&sig=Cg0ArKJSzEY8NK5ga73gEAE&urlfix=1&adurl=
h2
8538.0170000717
8545.4480000772
813
0
200
image/gif
Image
https://www.google.com/recaptcha/api2/webworker.js?hl=en&v=tftmXwdbgCvrXiHxr5HGbIaL
h2
8540.4489999637
8564.3360000104
894
102
200
text/javascript
Other
https://www.google.com/recaptcha/api2/webworker.js?hl=en&v=tftmXwdbgCvrXiHxr5HGbIaL
h2
8550.0179999508
8565.34500001
894
102
200
text/javascript
Other
https://s0.2mdn.net/879366/DcmEnabler_01_243.js
h2
9002.1039999556
9006.2549998984
11520
29596
200
text/javascript
Script
https://www.google.com/recaptcha/api2/reload?k=6LcOQLAUAAAAAJE6aHUcEpbVmTsNus99g_88TITd
h2
9015.2660000604
9062.3349999078
16673
28903
200
application/json
XHR
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuUVkeEsFwrQPM2XswbwCIilPvh7wpgwqc_Sv5vYbA-eQ0hwi4TK8BBqwmRSIVOa06qP_OWHfhgUfDrcTds8gt9bK5DEHBzcPIDnMVtAb_e7HAzTtnbSaJURLVS3ly4UZNromR9ZzNmC_LUO5PNZCEI1OL5JI9AVx4t1O07VC33XdROiVRwStVdK5VYTZNxqBYT4rP0k2GzfDaw2ZAjZ5wbtQZVlHi1UblxTW0vUaauyLmhDySlLwRlid3XSk3Z2ViaAc4RRTzds4fmpm5DDIRYMZq30NFH5SKHQeNUXz50Nxgg0Nn0CrPqSskLD-LG9vY&sai=AMfl-YRDQG09aY4HIWL7nfrudtfN4Lsshz1wgx9kv_QkS3XhmivSUfybLHagg8PalOF34STEsqwJjdSH8qTdIMP5ddzjfvMUd5AaXtleeZpe_Cc2AN-tDfxH7Yi4QCPGSgzY&sig=Cg0ArKJSzJXYegI2Jy4tEAE&urlfix=1&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCxudWxsXQ%3D%3D&adurl=
h2
9073.413999984
9123.8969999831
1002
0
200
image/gif
Fetch
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Voting-banner-final.gif
http/1.1
9146.4769998565
12317.151000025
1784922
1784510
200
image/gif
Image
https://dgdwa0ulmobn4.cloudfront.net/wp-content/uploads/2020/10/Slider_welcome_player.jpg.webp
h2
9207.5940000359
9882.7700000256
1094
1400
404
text/html
Image
https://r.popin.cc/log.gif?type=related-th&uid=68fd96f846172df68fc1632731889401&url=https%3A%2F%2Fwww.cybersecasia.net%2F&t=1632706690517
http/1.1
9238.7429999653
10510.818999959
308
35
200
image/gif
Image
https://www.google-analytics.com/collect?v=1&_v=j93&a=822660840&t=event&_s=2&dl=https%3A%2F%2Fwww.cybersecasia.net%2F&ul=en-us&de=UTF-8&dt=CybersecAsia%20%7C%20Asia%27s%20most%20trusted%20enterprise%20cybersecurity%20information%20portal&sd=24-bit&sr=360x640&vp=360x640&je=0&ec=&ea=Ivory%20Search%20-%20Default&el=&_u=aAhAAUABAAAAAC~&jid=&gjid=&cid=442695343.1632706688&tid=UA-145136419-1&_gid=1136837572.1632706689&gtm=2ou9m0&z=1604498115
h2
10700.027999934
10703.368999995
623
35
200
image/gif
Image
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=2021092001&st=env
h2
10703.24199996
10717.593000038
8873
10744
200
application/json
XHR
https://ma.zoho.com/hub/js/MagicPopup.js?t=1632706691984
http/1.1
10705.873999977
11018.98199995
7171
27086
200
application/javascript
Script
https://tpc.googlesyndication.com/sodar/sodar2.js
h2
11051.84199987
11060.47799997
7242
17713
200
text/javascript
Script
https://maillist-manage.com/wa/PopupRequest?callback=processData&webAutoId=27218d28c96aa859e529e5bdf4a9ccfb6&zuid=2ac5d97184e3b631c6a73058460b2a736&domain=2a8d665163b105b383759cab4da946a376a73058460b2a736&orgDomainId=2ea4fb3d57d695ac93527561a82ffdb4140fbf6cd35f5c50c&reqType=0&ref=&socialshare=null&value=CybersecAsia%20%7C%20Asia%27s%20most%20trusted%20enterprise%20cybersecurity%20information%20portal&zc_cu_exp=1632733690000,1&action=viewed&zc_cu=3zffb6abfc576144c5878d1b556a511413-v3z72800e47dd6e144404cfafb3b280ebecaf2f7850ed2144e14bc40ec2f3a9560c&url=https%3A%2F%2Fwww.cybersecasia.net%2F&parentUrl=https%3A%2F%2Fwww.cybersecasia.net%2F&from=WA
http/1.1
11074.48099996
11535.977999913
1018
296
200
application/javascript
Script
https://tpc.googlesyndication.com/sodar/sodar2/224/runner.html
h2
11079.725000076
11087.862999877
5878
12789
200
text/html
Document
https://www.google.com/recaptcha/api2/aframe
h2
11082.141000079
11090.588999912
1487
783
200
text/html
Document
https://pagead2.googlesyndication.com/pagead/sodar?id=sodar2&v=224&li=gpt_2021092001&jk=2338046877300969&rc=05AH-MKGUY3spqX-8VvlbrRkdekHqFP6Vx2dZZ8G2-TCBDYQOrVd3GRVxHM27OXsl_dsIjhyHbF69hqpQumuT4Di_gx8ZeugnhIQ6O3Ld9cfemlsRqkkAo113F3Ot6MZn-Lp8Gxp44W8w6CUzXDz2eMIrfLr8ggzAC4AsBcKphMAJSOvKbRdhDBRGncjWyLVd6u2vTk_wNo6vwc_XnlbROkBduqPI8XRIx2zFQktO_4mJFJCFVKaiF7puJ16zUdUgZGnpTWIOh1rLZvnycmCNC_SQlLQYEl2e4QVUh07SYIQ0DHJjCTA
h2
11117.889999878
11145.026999991
481
0
204
text/html
Image
https://pagead2.googlesyndication.com/bg/WOdvqX5MrEWan8NE-dDT01W_bgveDh48divqo2Vh5b0.js
h2
11126.746000024
11131.742999889
14491
36113
200
text/javascript
Script
https://pagead2.googlesyndication.com/pagead/sodar?id=sodar2&v=224&t=2&li=gpt_2021092001&jk=2338046877300969&bg=!8_Cl8LTNAAZNQyuQTUM7ACkAdvg8Wj9N8RqN7IJAM_HWqLlChz2uOEb4D0H8fACou5txFRSRD2ylygIAAADeUgAAABBoAQeZApRB21C_v19QgZszjdahxcCkySKxi2CTpRS0RDI65Mbw9Wj2KGnwbj3JNoNlyOYIL3NM0_onGuUlQqsgLNUjhH9Gp5yus3V92ze5aEYE1clcT5R6sDMRmJvWQuZgC3eK-_IEF8A3W6qxxaXX9TRriWBwCJLoWTxUa7zLWN3etR_aMXaTOsBvsBHQQlQ4UzPtWwSGKmrnB5A2GbaNwaEUUb186reP1XNt9NmhsgJ6boES-VAjq9BipJOErC66xADKX0HPhEpX6ZtLDXOb5RQJyeqpAwqyJXjnc313gI4FQh1KGDX2u1wqRDI95UkTrOq_DZH4rvF8t6xHlpkeU2ICmDvK_8i7LrOVMV-9jPyGqyNF4RZqaqiJ6LowBXOQob6UREOyoGGdIeNkM7EHHqXSOhg7lall74Si2ADa1Du7waFYl34_x5inNsYEwe5MeRhYWMhpvxVSPkvxwmPYQ5QLHSQfk62K_G4A5CdHu3JkPLpxqVu8-HLOcAR3H-MF13sEF54VxqBThwjz_pD7gXFq1IJh6JUnUBVbCZwEnGrIzqMw-3fYrKiFo9ojdskbCJsXhoUWk7CppT0TNZBaqF9-Quv8-Mp76Xh07XKB0UbZixQQJpq2xHLDW4keEzQPm-ORWzseNSeftRcVI_X3ohnIOaA6p_H4pvK-FyaqqX8HkavaCh77xmxTSKi007-ntb6G5FK2VHTMb60u0AaNTZz4ji6ubd0ED8RO3M7IGumV7t7xBnivhWOPBiwDBXWwzvMYdidwxNIiUiqyd6Na19c_Pguw2welNPyfDfpQEqIfit1_C-wSLcKOlwc38cyXH38J0oiZHO2EDS1xU52COGFAUrtJwB81I2FC3LgUGNJpP6zfd6o2AM0
h2
11406.560000032
11428.543000016
543
0
204
text/html
Image
https://ma.zoho.com/wa/PopupSignUpForm?callback=processData&pType=1&popupInfoMap_Id=591128000003363013&listId=18341bc8b8e7c8bb&signupFormId=18341bc8b8fcd0bd&m=getSignupUrl&zuid=2ac5d97184e3b631c6a73058460b2a736&from=WA&ind=0
http/1.1
11540.867999895
12015.634000069
1059
174
200
application/javascript
Script
https://ma.zoho.com/ua/Optin?od=11287ecb040c03&zx=12986efb5&lD=18341bc8b8e7c8bb&n=11699f74fed2ef8&sD=18341bc8b8fcd0bd
http/1.1
12019.611999858
12487.032999983
6073
26110
200
text/html
XHR
https://js.zohostatic.com/campaigns/hubstatic/hub/js/optin.min.js?t=1632706693770
http/1.1
12492.799999891
12721.761999885
11579
38273
200
application/javascript
Script
https://campaign-image.com/zohocampaigns/12983cd36_bg_1.jpg
http/1.1
12504.619000014
12967.758999905
16647
16324
200
image/jpeg
Image
https://ma.zoho.com/images/challangeiconenable.jpg
http/1.1
12504.826999968
12812.323000049
1314
969
200
image/jpeg
Image
https://ma.zoho.com/images/videoclose.png
http/1.1
12505.034999922
12962.032000069
3313
2967
200
image/png
Image
https://cped.maillist-manage.com/ua/TrailEvent
http/1.1
12729.6529999
13266.455000034
870
0
200
application/javascript
XHR
https://cped.maillist-manage.com/ua/waformrep
http/1.1
12729.918000055
13048.500000034
947
0
200
application/json
XHR
https://ma.zoho.com/js/dig.js
http/1.1
12731.089999899
12812.204000074
2479
5598
200
application/javascript
Script
https://fonts.googleapis.com/css?family=Nunito+Sans:400,600,700
h2
12749.562999932
12767.807999859
1371
4954
200
text/css
Stylesheet
Network Round Trip Times — 0 ms
High Network RTT (Round Trip Times) can have a large impact on performance. Providing servers geographically closer to the user could improve performance.
Server Backend Latencies — 0 ms
High server latencies indicate the server is overloaded or has a poor backend performance.
Tasks
Below is a list of the top-level main thread tasks that executed during page load.
Start Time (Ms) End Time (Ms)
5136.542
6.073
5146.857
7.037
5164.357
8.325
5172.836
6.947
5187.043
5.692
5381.994
10.488
5422.684
14.284
5867.227
54.045
5922.151
23.428
5948.739
9.423
5961.451
21.367
5982.876
15.883
5999.133
50.872
6050.736
5.111
6061.679
19.295
6083.154
20.856
6104.844
6.49
6114.715
11.608
6128.862
188.178
6319.994
9.814
6347.605
44.434
6392.192
8.467
6405.669
5.922
6414.922
9.218
6432.116
50.053
6482.2
16.686
6499.036
9.305
6510.9
60.874
6571.796
34.53
6608.111
35.998
6644.126
11.424
6663.085
13.112
6684.544
7.688
6721.332
177.562
6899.014
8.004
6911.196
6.684
6921.427
10.728
6932.504
15.005
6954.109
82.2
7036.386
7.494
7049.386
68.499
7131.467
42.879
7181.294
52.24
7235.91
59.236
7307.877
89.507
7398.153
16.531
7414.81
19.349
7436.104
385.374
7821.579
9.198
7849.911
7.341
7857.267
5.71
7881.667
5.684
7911.402
16.177
7931.454
10.043
7949.71
148.759
8098.717
6.673
8108.057
8.023
8140.987
21.508
8182.382
45.642
8241.447
7.934
8253.138
13.165
8267.083
28.059
8311.378
54.348
8377.884
14.126
8402.099
74.002
8476.486
72.745
8554.996
16.242
8584.066
13.889
8607.081
40.222
8650.044
27.225
8677.322
5.691
8683.399
35.866
8725.867
11.868
8739.287
19.897
8762.186
119.782
8884.716
13.237
8901.886
11.424
8917.652
9.491
8927.524
101.012
9035.099
5.42
9043.81
5.279
9051.935
10.064
9068.65
7.442
9090.245
18.41
9115.179
5.279
9131.423
20.66
9160.235
6.302
9188.858
5.068
9215.59
5.826
9221.869
35.026
9257.922
14.503
9273.142
11.01
9299.285
5.466
9530.62
15.403
9597.561
7.227
9614.505
71.319
9689.619
10.614
9702.207
6.968
9864.136
6.521
9992.027
10.304
10003.173
11.62
10224.976
12.676
10545.707
197.515
10747.833
52.956
10800.819
20.547
10821.39
255.223
11087.449
11.077
11105.968
8.678
11126.218
6.914
11133.178
6.612
11167.655
22.91
11193.779
11.965
11208.339
13.577
11225.052
11.581
11239.002
6.021
11250.906
14.456
11267.72
13.752
11291.759
9.293
11303.657
11.42
11318.122
8.573
11330.354
13.827
11348.088
15.073
11367.935
15.271
11383.462
14.139
11397.736
8.605
11431.93
6.516
11814.203
8.129
12444.799
11.825
12456.64
8.189
12466.111
8.504
12480.742
7.887
12497.646
5.488
12514.272
5.416
12521.438
18.317
12539.917
5.182
12564.111
5.547
12580.895
5.51
12597.775
5.035
12647.513
5.357
12697.441
5.102
12714.72
6.422
12731.034
5.654
12758.159
6.77
12765.01
6.132
12780.141
5.58
12785.751
9.936
12814.402
31.372
12864.096
7.716
12964.171
10.893
13280.817
5.429
Diagnostics
Below is a collection of useful page vitals.
View Data
Metrics
Below is a collection of metrics.
View Data
Script Treemap Data
Provide as required, for treemap app.

Opportunities

Avoid serving legacy JavaScript to modern browsers — Potential savings of 31 KiB
Polyfills and transforms enable legacy browsers to use new JavaScript features. For bundled JavaScript it is recommended to adopt a modern script deployment strategy using module/nomodule feature detection. This will reduce the amount of code shipped to modern browsers.
URL Potential Savings (Bytes)
https://www.cybersecasia.net/wp-content/plugins/popups-for-divi/scripts/ie-compat.min.js?ver=3.0.3
10845
https://www.cybersecasia.net/wp-content/plugins/add-search-to-menu/public/js/ivory-ajax-search.min.js?ver=4.6.6
8426
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/js/simplebar.min.js?ver=2.2.5
8374
https://api.popin.cc/searchbox/cybersecasia.js
4509

Metrics

First Contentful Paint — 4.1 s
The time taken for the first image or text on the page to be rendered.
Speed Index — 97.7 s
The time taken for the page contents to be visibly populated.
Largest Contentful Paint — 133.9 s
The timing of the largest text or image that is painted.
Time to Interactive — 120.5 s
The time taken for the page to become fully interactive.
Total Blocking Time — 2,490 ms
The total blocking time is the sum of all time periods between First Contentful Paint and Time to Interactive (when task length exceeded 50ms).
Cumulative Layout Shift — 0.923
Cumulative Layout Shift is the measurement of visible elements collective movement within the viewport.
View Data

Other

Max Potential First Input Delay — 770 ms
Users could experience a delay when interacting with the page.
First Meaningful Paint — 4.1 s
The time taken for the primary content of the page to be rendered.
First Contentful Paint (3G) — 8106 ms
The time taken for the first image or text on the page to be rendered while on a 3G network.

Opportunities

Eliminate render-blocking resources — Potential savings of 1,810 ms
Resources, such as JavaScript and style sheets, can block the first paint of the page. Cybersecasia.net should consider delivering critical JavaScript/style sheets (JS/CSS) inline and deferring all non-critical JS/CSS.
URL Transfer Size (Bytes) Potential Savings (Ms)
https://www.cybersecasia.net/wp-content/plugins/wp-social/assets/css/frontend.css?ver=5.8.1
6848
150
https://www.cybersecasia.net/wp-content/plugins/wp-social/assets/css/font-icon.css?ver=5.8.1
7618
150
https://www.cybersecasia.net/wp-content/themes/Extra/style.min.css?ver=4.10.8
43707
450
https://www.cybersecasia.net/wp-content/plugins/supreme-modules-for-divi/styles/style.min.css?ver=2.4.0
15157
300
https://www.cybersecasia.net/wp-content/plugins/ultimate-member/assets/css/um-profile.css?ver=2.2.5
2453
150
https://www.google.com/recaptcha/api.js?render=6LcOQLAUAAAAAJE6aHUcEpbVmTsNus99g_88TITd
1202
780
https://www.cybersecasia.net/wp-includes/js/jquery/jquery.min.js?ver=3.6.0
31177
150
https://www.cybersecasia.net/wp-content/plugins/smart-slider-3/Public/SmartSlider3/Application/Frontend/Assets/dist/n2.min.js?ver=821e0c40
11696
150
https://www.cybersecasia.net/wp-content/plugins/smart-slider-3/Public/SmartSlider3/Application/Frontend/Assets/dist/smartslider-frontend.min.js?ver=821e0c40
29535
150
Properly size images — Potential savings of 21,486 KiB
Images can slow down the page's load time. Cybersecasia.net should consider serving more appropriate-sized images.
URL Resource Size (Bytes) Potential Savings (Bytes)
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/phishing+kity.jpg
14776094
14765959
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Government+agency+escapes+a+cyberattack+while+trialing+an+AI+security+solution.jpg
1295421
1292076
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/cyber-financial.jpg
1138111
1132816
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/online-financial.jpg
1048311
1043434
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/2021/hybrid-workplace1111.jpg
901943
899614
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/zero-trust11.jpg
961442
738771
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Running+outdated+software+on+your+server.jpg
724324
720954
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Callsign+-+Rethink+your+SMS+Approach.jpg
815398
674770
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/CYBERSECasia.fw.png
297045
235169
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/sparking.jpg
147690
146936
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/online-banking.jpg
136801
135172
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-21111.jpg
311074
126638
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Quick+Link.png
117841
89515
Defer offscreen images — Potential savings of 49,760 KiB
Time to Interactive can be slowed down by resources on the page. Cybersecasia.net should consider lazy-loading offscreen and hidden images.
URL Resource Size (Bytes) Potential Savings (Bytes)
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/phishing+kity.jpg
14776094
14776094
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/claroty3.gif
3301975
3301975
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/hillstone-gold.gif
3270699
3270699
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Homepage-DiamondSponsor-BT3.gif
3113045
3113045
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/beyondtrust-diamond.gif
2911562
2911562
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/video-crowdstrike.png
1895752
1895752
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Voting-banner-final.gif
1784510
1784510
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/final-silver-synopsys.gif
1586511
1586511
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Veeam-thumbnail-2-fir.png
1520835
1520835
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Government+agency+escapes+a+cyberattack+while+trialing+an+AI+security+solution.jpg
1295421
1295421
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/cyber-financial.jpg
1138111
1138111
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/image_2021_05_31T07_10_04_897Z.png
1046324
1046324
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Veeam-thumbnail-1-sec.png
1023519
1023519
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/zero-trust11.jpg
961442
961442
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/2021/hybrid-workplace1111.jpg
901943
901943
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Callsign+-+Rethink+your+SMS+Approach.jpg
815398
815398
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/video-fortinet.jpg
651938
651938
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/rep-ossra-2021.jpg
646773
646773
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Rubrik-socmed.jpg
635459
635459
https://dgdwa0ulmobn4.cloudfront.net/wp-content/uploads/2020/10/Slider_welcome_player.jpg
574824
574824
https://www.cybersecasia.net/wp-content/uploads/2020/10/Slider_welcome_player.jpg
574586
574586
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Cisco-thumbnail-1-q4.jpg
522686
522686
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Peril+in+a+Pandemic_032221.jpg
511569
511569
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-1+copy.jpg
478847
478847
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-3-21111.jpg
396713
396713
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-21111.jpg
311074
311074
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/CYBERSECasia.fw.png
297045
297045
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Fortinet+-+thumbnail-0017.jpg
271035
271035
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Fortinet+-+thumbnail-001.jpg
254356
254356
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/sparking.jpg
147690
147690
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/online-banking.jpg
136801
136801
https://www.cybersecasia.net/wp-content/uploads/2019/11/How-to-protect-your-business-in-the-digital-economy-440x264.jpg
122381
122381
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Quick+Link.png
117841
117841
https://www.cybersecasia.net/wp-content/uploads/2021/01/Untitled-440x264.png
116294
116294
https://www.cybersecasia.net/wp-content/uploads/2019/11/cybercrimecon-440x264.jpg
114563
114563
https://www.cybersecasia.net/wp-content/uploads/2020/09/Frost-Sullivan-Assesment-BlackBerry-White-Paper-6-22-20-440x264.png
112157
112157
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-the-state-of-the-security-team-research-report11-440x264.jpg
101532
101532
https://www.cybersecasia.net/wp-content/uploads/2020/12/THUMBNAIL-TEMPLATE-paloalto-440x264.jpg
89547
89547
https://www.cybersecasia.net/wp-content/uploads/2020/08/BYLINE-CYBERSEC-copy11-440x264.jpg
87881
87881
https://www.cybersecasia.net/wp-content/uploads/2021/02/Thumbnail_LP-440x264.jpg
67682
67682
https://www.cybersecasia.net/wp-content/uploads/2021/02/Continuous-Security-Putting-it-all-Together-440x264.jpg
63874
63874
https://www.cybersecasia.net/wp-content/uploads/2021/02/AppSec-In-the-DevOps-Environment2-440x264.jpg
60281
60281
https://www.cybersecasia.net/wp-content/uploads/2021/01/prioritize2021-440x264.jpg
56076
56076
https://www.cybersecasia.net/wp-content/uploads/2021/01/Thales-thumbnail-1-440x264.jpg
55011
55011
https://www.cybersecasia.net/wp-content/uploads/2021/02/Continuous-Application-Security-with-HCL-AppScan-440x264.jpg
54160
54160
https://www.cybersecasia.net/wp-content/uploads/2021/01/Thales-thumbnail-2-440x264.jpg
54128
54128
https://www.cybersecasia.net/wp-content/uploads/2021/04/shellcode-440x264.jpg
44857
44857
https://www.cybersecasia.net/wp-content/uploads/2021/03/widget-homepage3.png
43647
43647
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-security-operations-maturity-model-white-paper-updated-440x264.jpg
37688
37688
https://www.cybersecasia.net/wp-content/uploads/2021/07/ransomware-fortinet-guide-440x264.jpg
36610
36610
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_QuickGuide_2020_EnableSecureYourRemoteWorkforce-440x264.jpg
36298
36298
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-trending-phishing-techiques-white-paper-2020-440x264.jpg
36278
36278
https://www.cybersecasia.net/wp-content/uploads/2021/09/Rising-supply-chain-ransomware-threats-drive-greater-intel-sharing-in-global-financial-industry-440x264.jpg
35422
35422
https://www.cybersecasia.net/wp-content/uploads/2021/07/Fortinet-thumbnail-07689792-440x264.jpg
35381
35381
https://www.cybersecasia.net/wp-content/uploads/2020/09/7-benefits-of-cloud-email-security-440x264.jpg
35371
35371
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-true-cost-of-free-440x264.jpg
34597
34597
https://www.cybersecasia.net/wp-content/uploads/2020/03/HOW-SMES-CAN-QUICKLY-AND-COST-EFFECTIVELY-DEPLOY-DEFENSES-AGAINST-CYBERTHREATS-440x264.jpg
31384
31384
https://www.cybersecasia.net/wp-content/uploads/2021/08/sakura-new-440x264.jpg
31208
31208
https://www.cybersecasia.net/wp-content/uploads/2020/12/fortinet-video-440x264.jpg
31074
31074
https://www.cybersecasia.net/wp-content/uploads/2021/09/Dealing-with-%E2%80%98vulnerability-lag-440x264.jpg
30744
30744
https://www.cybersecasia.net/wp-content/uploads/2021/08/thumbnail-m1-440x264.jpg
30655
30655
https://www.cybersecasia.net/wp-content/uploads/2021/09/Staying-current-is-key-for-security-in-businesses1-440x264.jpg
30347
30347
https://www.cybersecasia.net/wp-content/uploads/2020/10/Horangi-Case-Study-Wallex-440x264.jpg
30189
30189
https://www.cybersecasia.net/wp-content/uploads/2021/06/hppp333-440x264.jpg
29790
29790
https://www.cybersecasia.net/wp-content/uploads/2020/08/BeyondTrust_Whitepaper_Quick-Guide-Enable-Secure-Your-Remote-Workforce-440x264.jpg
29063
29063
https://www.cybersecasia.net/wp-content/uploads/2021/07/Keeping-surging-cyber-threats-at-bay-in-the-New-Normal-1-440x264.jpg
28674
28674
https://www.cybersecasia.net/wp-content/uploads/2021/01/threat-landscape-440x264.jpg
28305
28305
https://www.cybersecasia.net/wp-content/uploads/2021/09/Adopting-an-attacker-mindset-is-good-for-cybersecurity-440x264.jpg
27366
27366
https://www.cybersecasia.net/wp-content/uploads/2020/10/Horangi-Case-Study-Zave-440x264.jpg
27294
27294
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_Zero_Trust_Secure_Remote_Access_wp-440x264.jpg
27073
27073
https://www.cybersecasia.net/wp-content/uploads/2020/10/Gnowbe-Case-Study-440x264.jpg
26730
26730
https://www.cybersecasia.net/wp-content/uploads/2020/08/2020_Sensitive-data-protection-in-the-retail-card-payments-ecosystem-440x264.jpg
26237
26237
https://www.cybersecasia.net/wp-content/uploads/2021/01/wp-untangling-the-web-of-cloud-security-threats-440x264.jpg
26030
26030
https://www.cybersecasia.net/wp-content/uploads/2020/07/beuamer-Data-Protection-Global-Report-2019_thumbnails-440x264.jpg
25744
25744
https://www.cybersecasia.net/wp-content/uploads/2020/09/spear-phishingv4-440x264.jpg
25563
25563
https://www.cybersecasia.net/wp-content/uploads/2021/06/gartners-magic-1-440x264.jpg
24785
24785
https://www.cybersecasia.net/wp-content/uploads/2021/07/hybrid-workplace1111-284x170.jpg
24057
24057
https://www.cybersecasia.net/wp-content/uploads/2021/04/NTT_thumbnail-001-440x264.jpg
23714
23714
https://www.cybersecasia.net/wp-content/uploads/2020/06/Whitepaper_BlackBerry_ZeroTrust_FINAL-copy-440x264.jpg
23637
23637
https://www.cybersecasia.net/wp-content/uploads/2020/07/report_spear-phishing_thumbnail-440x264.jpg
23091
23091
https://www.cybersecasia.net/wp-content/uploads/2021/04/ransomware-on-the-Rise-440x264.jpg
22908
22908
https://www.cybersecasia.net/wp-content/uploads/2020/08/BeyondTrust_Whitepaper_The-Guide-to-Just-In-Time-Privileged-Access-Management-440x264.jpg
22440
22440
https://www.cybersecasia.net/wp-content/uploads/2020/07/apj-uda-holdings-case-study-440x264.jpg
22437
22437
https://www.cybersecasia.net/wp-content/uploads/2020/04/The-LogRhythm-Security-Using-Security-Operations-Maturity-Model-440x264.jpg
22308
22308
https://www.cybersecasia.net/wp-content/uploads/2020/10/Horangi-Whitepaper-Selecting-A-CSPM-Solution-440x264.jpg
22054
22054
https://www.cybersecasia.net/wp-content/uploads/2020/08/thumbnail_template-copy-440x264.jpg
21331
21331
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-top-5-remote-access-problems-440x264.jpg
20882
20882
https://www.cybersecasia.net/wp-content/uploads/2020/07/2020-SD-WAN-Report-Public-Cloud_thumbnail-440x264.jpg
20785
20785
https://www.cybersecasia.net/wp-content/uploads/2021/08/APT2-284x170.jpg
20599
20599
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/MartechAsia/Featured+Images/2021/TLM-logo.svg
20285
20285
https://www.cybersecasia.net/wp-content/uploads/2021/03/Pulse-Secure_Thumbnail-1-440x264.jpg
19853
19853
https://www.cybersecasia.net/wp-content/uploads/2021/08/Fortinet-thumbnail-028-440x264.jpg
19840
19840
https://www.cybersecasia.net/wp-content/uploads/2021/06/micro-virty-440x264.jpg
18912
18912
https://www.cybersecasia.net/wp-content/uploads/2021/06/Guide-Thumbnail-1-440x264.jpg
18690
18690
https://www.cybersecasia.net/wp-content/uploads/2020/10/145606-Idaptive-Top-Ten-Considerations-WP-EN-v1-440x264.jpg
18677
18677
https://www.cybersecasia.net/wp-content/uploads/2020/10/aag-why-cisco-security-for-sb-img-440x264.jpg
18458
18458
https://www.cybersecasia.net/wp-content/uploads/2020/08/2020_Jan_ISARA-HSM-WP-v10-440x264.jpg
18446
18446
https://www.cybersecasia.net/wp-content/uploads/2020/07/Barracuda-eBook_13-email-threats_may2020_thumbnail-440x264.jpg
18392
18392
https://www.cybersecasia.net/wp-content/uploads/2020/04/2020_VT_Trends-Report-reduced-images-440x264.jpg
18233
18233
https://www.cybersecasia.net/wp-content/uploads/2021/07/Kemp-Thumbnail-1-final-440x264.jpg
18112
18112
https://www.cybersecasia.net/wp-content/uploads/2021/08/Thumbnail-srei-440x264.jpg
17839
17839
https://www.cybersecasia.net/wp-content/uploads/2020/10/145601-Idaptive_Case_Study_New-Zealand-Avocado-440x264.jpg
17519
17519
https://www.cybersecasia.net/wp-content/uploads/2020/10/enterprise-firewall-5-tips-img-440x264.jpg
17434
17434
https://www.cybersecasia.net/wp-content/uploads/2021/08/Thumbnail-0399-440x264.jpg
17411
17411
https://www.cybersecasia.net/wp-content/uploads/2020/06/Whitepaper_BringingOrdertoChaoswithUES_Final-copy-440x264.jpg
17384
17384
https://www.cybersecasia.net/wp-content/uploads/2021/04/quantum-computing-440x264.jpg
17158
17158
https://www.cybersecasia.net/wp-content/uploads/2020/10/145609-Idaptive-Six-IT-Security-Risks-WP-EN-v1_new-440x264.jpg
17043
17043
https://www.cybersecasia.net/wp-content/uploads/2021/07/Kemp-Thumbnail-2-440x264.jpg
16712
16712
https://www.cybersecasia.net/wp-content/uploads/2020/08/2020_Jun_A-Comprehensive-Guide-to-Authentication-Technologies-and-Methods-440x264.jpg
16627
16627
https://www.cybersecasia.net/wp-content/uploads/2020/08/2020_Guide_to_Database_Encryption_guide_WP_A4_v2-440x264.jpg
16589
16589
https://www.cybersecasia.net/wp-content/uploads/2021/04/building-the-foundation-440x264.jpg
16395
16395
https://www.cybersecasia.net/wp-content/uploads/2021/01/black-440x264.jpg
16209
16209
https://www.cybersecasia.net/wp-content/uploads/2020/07/Cyber-AI-for-SaaS-Security_-Protecting-Your-Dynamic-Workforce-440x264.jpg
15988
15988
https://www.cybersecasia.net/wp-content/uploads/2020/10/ngfw-futureoffirewalling-wp-img-440x264.jpg
15860
15860
https://www.cybersecasia.net/wp-content/uploads/2020/07/Email-Security-Threat-Report-2020-440x264.jpg
15629
15629
https://www.cybersecasia.net/wp-content/uploads/2020/10/145608-Idaptive-IDaaS-Buyers-Guide-EN-v1-440x264.jpg
15276
15276
https://www.cybersecasia.net/wp-content/uploads/2021/04/image_2021_04_22T03_12_15_226Z-440x264.jpg
14538
14538
https://www.cybersecasia.net/wp-content/uploads/2021/03/gartner-pulse-sec-440x264.jpg
14500
14500
https://www.cybersecasia.net/wp-content/uploads/2020/04/Skybox_Cloud_Trends_Report-images-440x264.jpg
14428
14428
https://www.cybersecasia.net/wp-content/uploads/2020/04/LogRhythm-Named-a-Leader-in-2020-Gartner-SIEM-Magic-Quadrant-440x264.jpg
13654
13654
https://www.cybersecasia.net/wp-content/uploads/2020/08/2020_JUN_CipherTrust-Manager-solution-brief-for-KMIP-Clients-440x264.jpg
12384
12384
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_QuickGuide_2020_EnableSecureYourRemoteWorkforce-60x80.jpg
11869
11869
https://www.cybersecasia.net/wp-content/uploads/2021/04/myanmar2-60x60.jpg
11332
11332
https://www.cybersecasia.net/wp-content/uploads/2021/08/bank2222-60x60.jpg
10824
10824
https://dgdwa0ulmobn4.cloudfront.net/wp-content/plugins/smart-slider-3/Public/SmartSlider3/Widget/Shadow/ShadowImage/Assets/shadow/dark.png
10576
10576
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_Zero_Trust_Secure_Remote_Access_wp-60x80.jpg
10417
10417
https://www.cybersecasia.net/wp-content/uploads/2021/08/Role-of-biometrics-in-mitigating-security-risks-in-Asia-Pacific-60x60.jpg
9530
9530
https://www.cybersecasia.net/wp-content/uploads/2020/03/Worry-free-endpoint-protection-for-SMEs-bg-440x264.jpg
9403
9403
https://www.cybersecasia.net/wp-content/uploads/2021/07/Unifying-vulnerability-and-patch-management-in-the-WFH-era-60x60.jpg
9328
9328
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-new-CISO-mandate-protect-DevOps-60x60.jpg
9237
9237
https://www.cybersecasia.net/wp-content/uploads/2021/08/data-breaches-customer-60x60.png
8932
8932
https://www.cybersecasia.net/wp-content/uploads/2021/08/Knocking-down-barriers-for-a-cyber-secure-future-60x60.jpg
8904
8904
https://www.cybersecasia.net/wp-content/uploads/2021/08/Accuity-Trade-Compliance-Survey-Infographic-60x60.jpg
8877
8877
https://www.cybersecasia.net/wp-content/uploads/2021/08/Filling-the-gaps-in-Asias-cyber-resilience-efforts2-60x60.jpg
8546
8546
https://www.cybersecasia.net/wp-content/uploads/2020/09/spear-phishingv4-45x45.jpg
7606
7606
https://www.cybersecasia.net/wp-content/uploads/2020/01/Parly-1-60x60.jpg
7112
7112
https://www.cybersecasia.net/wp-content/uploads/2021/08/thumbnail-m1-80x60.jpg
2270
2270
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-true-cost-of-free-60x60.jpg
2253
2253
Reduce unused CSS — Potential savings of 100 KiB
Dead and/or unused rules in Style Sheets (CSS) can contribute to network payload sizes. Cybersecasia.net should consider removing dead rules from style sheets and deferring the loading of CSS not used for above-the-fold content.
URL Transfer Size (Bytes) Potential Savings (Bytes)
https://www.cybersecasia.net/wp-content/themes/Extra/style.min.css?ver=4.10.8
43707
35503
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/styles__ltr.css
26477
25109
@font-face{font-family:ETmodules;font-display:block;src:url(https://www.cybersecasia.net/wp-content/...
16792
16420
https://www.cybersecasia.net/wp-content/plugins/supreme-modules-for-divi/styles/style.min.css?ver=2.4.0
15157
15153
https://www.cybersecasia.net/wp-includes/css/dist/block-library/style.min.css?ver=5.8.1
10714
10714
Reduce unused JavaScript — Potential savings of 230 KiB
It is advised to remove unused JavaScript in order to reduce bytes consumed by network activity.
URL Transfer Size (Bytes) Potential Savings (Bytes)
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__en.js
136081
71590
https://www.cybersecasia.net/wp-content/themes/Extra/scripts/scripts.min.js?ver=4.10.8
79702
52428
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021092001.js?31062904
121042
51939
https://api.popin.cc/popin_discovery5-min.js
43216
36696
https://marketinghub.zoho.com/hub/js/WebsiteAutomation.js
36879
23237
Efficiently encode images — Potential savings of 19,082 KiB
Unoptimized images can consume more cellular data than what is necessary.
URL Resource Size (Bytes) Potential Savings (Bytes)
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/phishing+kity.jpg
14776094
11259844
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Government+agency+escapes+a+cyberattack+while+trialing+an+AI+security+solution.jpg
1295421
843213
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/cyber-financial.jpg
1138111
776757
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/online-financial.jpg
1048311
758095
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/2021/Is+there+a+rift+in+your+software+development+and+security+teams.jpg
1001792
694466
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/zero-trust11.jpg
961442
595119
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/2021/hybrid-workplace1111.jpg
901943
567268
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Callsign+-+Rethink+your+SMS+Approach.jpg
815398
537231
https://dgdwa0ulmobn4.cloudfront.net/wp-content/uploads/2021/03/bt-v3.jpg
857571
533559
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Running+outdated+software+on+your+server.jpg
724324
470289
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/rep-ossra-2021.jpg
646773
405579
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/video-fortinet.jpg
651938
387509
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Cisco-thumbnail-1-q4.jpg
522686
252686
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Peril+in+a+Pandemic_032221.jpg
511569
241569
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-1+copy.jpg
478847
208847
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-3-21111.jpg
396713
126713
https://www.cybersecasia.net/wp-content/uploads/2019/11/How-to-protect-your-business-in-the-digital-economy-440x264.jpg
122381
93341
https://www.cybersecasia.net/wp-content/uploads/2019/11/cybercrimecon-440x264.jpg
114563
85523
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-the-state-of-the-security-team-research-report11-440x264.jpg
101532
72492
https://www.cybersecasia.net/wp-content/uploads/2020/12/THUMBNAIL-TEMPLATE-paloalto-440x264.jpg
89547
60507
https://www.cybersecasia.net/wp-content/uploads/2020/08/BYLINE-CYBERSEC-copy11-440x264.jpg
87881
58841
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-21111.jpg
311074
41074
https://www.cybersecasia.net/wp-content/uploads/2021/02/Thumbnail_LP-440x264.jpg
67682
38642
https://www.cybersecasia.net/wp-content/uploads/2021/02/Continuous-Security-Putting-it-all-Together-440x264.jpg
63874
34834
https://www.cybersecasia.net/wp-content/uploads/2021/02/AppSec-In-the-DevOps-Environment2-440x264.jpg
60281
31241
https://www.cybersecasia.net/wp-content/uploads/2021/01/prioritize2021-440x264.jpg
56076
27036
https://www.cybersecasia.net/wp-content/uploads/2021/01/Thales-thumbnail-1-440x264.jpg
55011
25971
https://www.cybersecasia.net/wp-content/uploads/2021/02/Continuous-Application-Security-with-HCL-AppScan-440x264.jpg
54160
25120
https://www.cybersecasia.net/wp-content/uploads/2021/01/Thales-thumbnail-2-440x264.jpg
54128
25088
https://www.cybersecasia.net/wp-content/uploads/2021/04/shellcode-440x264.jpg
44857
15817
https://www.cybersecasia.net/wp-content/uploads/2021/07/hybrid-workplace1111-284x170.jpg
24057
11987
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_QuickGuide_2020_EnableSecureYourRemoteWorkforce-60x80.jpg
11869
10669
https://www.cybersecasia.net/wp-content/uploads/2021/04/myanmar2-60x60.jpg
11332
10432
https://www.cybersecasia.net/wp-content/uploads/2021/08/bank2222-60x60.jpg
10824
9924
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_Zero_Trust_Secure_Remote_Access_wp-60x80.jpg
10417
9217
https://www.cybersecasia.net/wp-content/uploads/2021/09/Rising-supply-chain-ransomware-threats-drive-greater-intel-sharing-in-global-financial-industry-60x60.jpg
10100
9200
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-security-operations-maturity-model-white-paper-updated-440x264.jpg
37688
8648
https://www.cybersecasia.net/wp-content/uploads/2021/08/Role-of-biometrics-in-mitigating-security-risks-in-Asia-Pacific-60x60.jpg
9530
8630
https://www.cybersecasia.net/wp-content/uploads/2021/08/APT2-284x170.jpg
20599
8529
https://www.cybersecasia.net/wp-content/uploads/2021/07/Unifying-vulnerability-and-patch-management-in-the-WFH-era-60x60.jpg
9328
8428
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-new-CISO-mandate-protect-DevOps-60x60.jpg
9237
8337
https://www.cybersecasia.net/wp-content/uploads/2021/09/Staying-current-is-key-for-security-in-businesses1-60x60.jpg
9214
8314
https://www.cybersecasia.net/wp-content/uploads/2021/09/Ransomware-is-easy-to-deploy-now-but-so-are-defence-strategies-60x60.jpg
9112
8212
https://www.cybersecasia.net/wp-content/uploads/2021/09/How-financial-institutions-can-limit-third-party-vendor-risks-60x60.jpg
9065
8165
https://www.cybersecasia.net/wp-content/uploads/2021/09/Are-legacy-banks-equal-to-neobanks-in-application-development-security-60x60.jpg
8976
8076
https://www.cybersecasia.net/wp-content/uploads/2021/08/Knocking-down-barriers-for-a-cyber-secure-future-60x60.jpg
8904
8004
https://www.cybersecasia.net/wp-content/uploads/2021/08/Accuity-Trade-Compliance-Survey-Infographic-60x60.jpg
8877
7977
https://www.cybersecasia.net/wp-content/uploads/2021/09/Is-your-Zero-Trust-posture-true-to-the-new-digitalization-landscape-60x60.jpg
8657
7757
https://www.cybersecasia.net/wp-content/uploads/2021/08/Filling-the-gaps-in-Asias-cyber-resilience-efforts2-60x60.jpg
8546
7646
https://www.cybersecasia.net/wp-content/uploads/2021/07/ransomware-fortinet-guide-440x264.jpg
36610
7570
https://www.cybersecasia.net/wp-content/uploads/2021/09/Dealing-with-%E2%80%98vulnerability-lag-284x170.jpg
19579
7509
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_QuickGuide_2020_EnableSecureYourRemoteWorkforce-440x264.jpg
36298
7258
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-trending-phishing-techiques-white-paper-2020-440x264.jpg
36278
7238
https://www.cybersecasia.net/wp-content/uploads/2020/09/spear-phishingv4-45x45.jpg
7606
7100
https://www.cybersecasia.net/wp-content/uploads/2021/09/Rising-supply-chain-ransomware-threats-drive-greater-intel-sharing-in-global-financial-industry-440x264.jpg
35422
6382
https://www.cybersecasia.net/wp-content/uploads/2021/07/Fortinet-thumbnail-07689792-440x264.jpg
35381
6341
https://www.cybersecasia.net/wp-content/uploads/2020/09/7-benefits-of-cloud-email-security-440x264.jpg
35371
6331
https://www.cybersecasia.net/wp-content/uploads/2020/01/Parly-1-60x60.jpg
7112
6212
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-true-cost-of-free-440x264.jpg
34597
5557
https://www.cybersecasia.net/wp-content/uploads/2021/09/Love-online-flirting-and-dating-284x170.jpg
17067
4997
https://www.cybersecasia.net/wp-content/uploads/2021/09/Adopting-an-attacker-mindset-is-good-for-cybersecurity-284x170.jpg
17003
4933
Serve images in next-gen formats — Potential savings of 28,418 KiB
Consider JPEG 2000, JPEG XR or WebP image formats which provide better compression than PNG and JPEG.
URL Resource Size (Bytes) Potential Savings (Bytes)
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/phishing+kity.jpg
14776094
12431927
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/video-crowdstrike.png
1895752
1731967.95
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Veeam-thumbnail-2-fir.png
1520835
1382216.2
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Government+agency+escapes+a+cyberattack+while+trialing+an+AI+security+solution.jpg
1295421
1096253.8
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/cyber-financial.jpg
1138111
990806.1
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/image_2021_05_31T07_10_04_897Z.png
1046324
977807.6
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Veeam-thumbnail-1-sec.png
1023519
972998.1
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/online-financial.jpg
1048311
937381
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/2021/Is+there+a+rift+in+your+software+development+and+security+teams.jpg
1001792
872569.3
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/zero-trust11.jpg
961442
809716.45
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/2021/hybrid-workplace1111.jpg
901943
763019.05
https://dgdwa0ulmobn4.cloudfront.net/wp-content/uploads/2021/03/bt-v3.jpg
857571
717100
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Callsign+-+Rethink+your+SMS+Approach.jpg
815398
661065.05
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Running+outdated+software+on+your+server.jpg
724324
615092.85
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/video-fortinet.jpg
651938
547110.75
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/rep-ossra-2021.jpg
646773
537634.5
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Cisco-thumbnail-1-q4.jpg
522686
342686
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Peril+in+a+Pandemic_032221.jpg
511569
331569
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-1+copy.jpg
478847
298847
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-3-21111.jpg
396713
216713
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/CYBERSECasia.fw.png
297045
193308
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-21111.jpg
311074
131074
https://www.cybersecasia.net/wp-content/uploads/2019/11/How-to-protect-your-business-in-the-digital-economy-440x264.jpg
122381
103021
https://www.cybersecasia.net/wp-content/uploads/2021/01/Untitled-440x264.png
116294
96934
https://www.cybersecasia.net/wp-content/uploads/2019/11/cybercrimecon-440x264.jpg
114563
95203
https://www.cybersecasia.net/wp-content/uploads/2020/09/Frost-Sullivan-Assesment-BlackBerry-White-Paper-6-22-20-440x264.png
112157
92797
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Fortinet+-+thumbnail-0017.jpg
271035
91035
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-the-state-of-the-security-team-research-report11-440x264.jpg
101532
82172
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Fortinet+-+thumbnail-001.jpg
254356
74356
https://www.cybersecasia.net/wp-content/uploads/2020/12/THUMBNAIL-TEMPLATE-paloalto-440x264.jpg
89547
70187
https://www.cybersecasia.net/wp-content/uploads/2020/08/BYLINE-CYBERSEC-copy11-440x264.jpg
87881
68521
https://www.cybersecasia.net/wp-content/uploads/2021/02/Thumbnail_LP-440x264.jpg
67682
48322
https://www.cybersecasia.net/wp-content/uploads/2021/02/Continuous-Security-Putting-it-all-Together-440x264.jpg
63874
44514
https://www.cybersecasia.net/wp-content/uploads/2021/02/AppSec-In-the-DevOps-Environment2-440x264.jpg
60281
40921
https://www.cybersecasia.net/wp-content/uploads/2021/01/prioritize2021-440x264.jpg
56076
36716
https://www.cybersecasia.net/wp-content/uploads/2021/01/Thales-thumbnail-1-440x264.jpg
55011
35651
https://www.cybersecasia.net/wp-content/uploads/2021/02/Continuous-Application-Security-with-HCL-AppScan-440x264.jpg
54160
34800
https://www.cybersecasia.net/wp-content/uploads/2021/01/Thales-thumbnail-2-440x264.jpg
54128
34768
https://www.cybersecasia.net/wp-content/uploads/2021/04/shellcode-440x264.jpg
44857
25497
https://www.cybersecasia.net/wp-content/uploads/2021/03/widget-homepage3.png
43647
20110
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-security-operations-maturity-model-white-paper-updated-440x264.jpg
37688
18328
https://www.cybersecasia.net/wp-content/uploads/2021/07/ransomware-fortinet-guide-440x264.jpg
36610
17250
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_QuickGuide_2020_EnableSecureYourRemoteWorkforce-440x264.jpg
36298
16938
https://www.cybersecasia.net/wp-content/uploads/2020/12/apj-trending-phishing-techiques-white-paper-2020-440x264.jpg
36278
16918
https://www.cybersecasia.net/wp-content/uploads/2021/09/Rising-supply-chain-ransomware-threats-drive-greater-intel-sharing-in-global-financial-industry-440x264.jpg
35422
16062
https://www.cybersecasia.net/wp-content/uploads/2021/07/Fortinet-thumbnail-07689792-440x264.jpg
35381
16021
https://www.cybersecasia.net/wp-content/uploads/2020/09/7-benefits-of-cloud-email-security-440x264.jpg
35371
16011
https://www.cybersecasia.net/wp-content/uploads/2021/07/hybrid-workplace1111-284x170.jpg
24057
16010
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-true-cost-of-free-440x264.jpg
34597
15237
https://www.cybersecasia.net/wp-content/uploads/2021/08/APT2-284x170.jpg
20599
12552
https://www.cybersecasia.net/wp-content/uploads/2020/03/HOW-SMES-CAN-QUICKLY-AND-COST-EFFECTIVELY-DEPLOY-DEFENSES-AGAINST-CYBERTHREATS-440x264.jpg
31384
12024
https://www.cybersecasia.net/wp-content/uploads/2021/08/sakura-new-440x264.jpg
31208
11848
https://www.cybersecasia.net/wp-content/uploads/2020/12/fortinet-video-440x264.jpg
31074
11714
https://www.cybersecasia.net/wp-content/uploads/2021/09/Dealing-with-%E2%80%98vulnerability-lag-284x170.jpg
19579
11532
https://www.cybersecasia.net/wp-content/uploads/2021/09/Dealing-with-%E2%80%98vulnerability-lag-440x264.jpg
30744
11384
https://www.cybersecasia.net/wp-content/uploads/2021/08/thumbnail-m1-440x264.jpg
30655
11295
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_QuickGuide_2020_EnableSecureYourRemoteWorkforce-60x80.jpg
11869
11069
https://www.cybersecasia.net/wp-content/uploads/2021/09/Staying-current-is-key-for-security-in-businesses1-440x264.jpg
30347
10987
https://www.cybersecasia.net/wp-content/uploads/2020/10/Horangi-Case-Study-Wallex-440x264.jpg
30189
10829
https://www.cybersecasia.net/wp-content/uploads/2021/04/myanmar2-60x60.jpg
11332
10732
https://www.cybersecasia.net/wp-content/uploads/2021/06/hppp333-440x264.jpg
29790
10430
https://www.cybersecasia.net/wp-content/uploads/2021/08/bank2222-60x60.jpg
10824
10224
https://www.cybersecasia.net/wp-content/uploads/2020/08/BeyondTrust_Whitepaper_Quick-Guide-Enable-Secure-Your-Remote-Workforce-440x264.jpg
29063
9703
https://www.cybersecasia.net/wp-content/uploads/2021/08/BT_Zero_Trust_Secure_Remote_Access_wp-60x80.jpg
10417
9617
https://www.cybersecasia.net/wp-content/uploads/2021/09/Rising-supply-chain-ransomware-threats-drive-greater-intel-sharing-in-global-financial-industry-60x60.jpg
10100
9500
https://www.cybersecasia.net/wp-content/uploads/2021/07/Keeping-surging-cyber-threats-at-bay-in-the-New-Normal-1-440x264.jpg
28674
9314
https://www.cybersecasia.net/wp-content/uploads/2021/09/Love-online-flirting-and-dating-284x170.jpg
17067
9020
https://www.cybersecasia.net/wp-content/uploads/2021/09/Adopting-an-attacker-mindset-is-good-for-cybersecurity-284x170.jpg
17003
8956
https://www.cybersecasia.net/wp-content/uploads/2021/01/threat-landscape-440x264.jpg
28305
8945
https://www.cybersecasia.net/wp-content/uploads/2021/08/Role-of-biometrics-in-mitigating-security-risks-in-Asia-Pacific-60x60.jpg
9530
8930
https://www.cybersecasia.net/wp-content/uploads/2021/07/Unifying-vulnerability-and-patch-management-in-the-WFH-era-60x60.jpg
9328
8728
https://www.cybersecasia.net/wp-content/uploads/2021/08/The-new-CISO-mandate-protect-DevOps-60x60.jpg
9237
8637
https://www.cybersecasia.net/wp-content/uploads/2021/09/Staying-current-is-key-for-security-in-businesses1-60x60.jpg
9214
8614
https://www.cybersecasia.net/wp-content/uploads/2021/09/Ransomware-is-easy-to-deploy-now-but-so-are-defence-strategies-60x60.jpg
9112
8512
https://www.cybersecasia.net/wp-content/uploads/2021/09/How-financial-institutions-can-limit-third-party-vendor-risks-60x60.jpg
9065
8465
https://www.cybersecasia.net/wp-content/uploads/2021/09/Are-legacy-banks-equal-to-neobanks-in-application-development-security-60x60.jpg
8976
8376
https://www.cybersecasia.net/wp-content/uploads/2021/08/data-breaches-customer-60x60.png
8932
8332
https://www.cybersecasia.net/wp-content/uploads/2021/08/Knocking-down-barriers-for-a-cyber-secure-future-60x60.jpg
8904
8304
https://www.cybersecasia.net/wp-content/uploads/2021/08/Accuity-Trade-Compliance-Survey-Infographic-60x60.jpg
8877
8277
Reduce initial server response time — Root document took 2,870 ms
It is advised to keep the server response time short for the main document, because all other requests depend on it.
URL Time Spent (Ms)
https://www.cybersecasia.net/
2871.739
Avoid multiple page redirects — Potential savings of 1,110 ms
Redirects can cause additional delays before the page can begin loading. Cybersecasia.net should avoid multiple or unnecessary page redirects.
URL Time Spent (Ms)
http://cybersecasia.net/
630
https://cybersecasia.net/
480
https://www.cybersecasia.net/
0
Use video formats for animated content — Potential savings of 15,333 KiB
Large GIFs are inefficient for delivering animated content. It is recommended to use MPEG4/WebM videos for animations and PNG/WebP for static images instead of GIF.
URL Resource Size (Bytes) Potential Savings (Bytes)
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/claroty3.gif
3301975
2938758
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/hillstone-gold.gif
3270699
2910922
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Homepage-DiamondSponsor-BT3.gif
3113045
2739480
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/beyondtrust-diamond.gif
2911562
2533059
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Voting-banner-final.gif
1784510
1445453
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Voting-banner-final.gif
1784510
1445453
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/final-silver-synopsys.gif
1586511
1269209
https://tpc.googlesyndication.com/simgad/5423342577657782387
616166
418993

Diagnostics

Avoid enormous network payloads — Total size was 58,113 KiB
Large network payloads can cost users money and are linked to long load times.
URL Transfer Size (Bytes)
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/phishing+kity.jpg
14776508
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/claroty3.gif
3302387
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/hillstone-gold.gif
3271111
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Homepage-DiamondSponsor-BT3.gif
3113457
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/beyondtrust-diamond.gif
2911974
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/video-crowdstrike.png
1896164
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Voting-banner-final.gif
1784922
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Voting-banner-final.gif
1784922
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/final-silver-synopsys.gif
1586923
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Veeam-thumbnail-2-fir.png
1521247
Serve static assets with an efficient cache policy — 62 resources found
Cybersecasia.net can speed up repeat visits by increasing the cache lifetime, which is essentially how long before a cached copy expires.
URL Cache TTL (Ms) Transfer Size (Bytes)
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/phishing+kity.jpg
0
14776508
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/claroty3.gif
0
3302387
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/hillstone-gold.gif
0
3271111
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Homepage-DiamondSponsor-BT3.gif
0
3113457
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/beyondtrust-diamond.gif
0
2911974
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/video-crowdstrike.png
0
1896164
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Voting-banner-final.gif
0
1784922
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Voting-banner-final.gif
0
1784922
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/final-silver-synopsys.gif
0
1586923
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Veeam-thumbnail-2-fir.png
0
1521247
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Government+agency+escapes+a+cyberattack+while+trialing+an+AI+security+solution.jpg
0
1295834
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/cyber-financial.jpg
0
1138524
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/online-financial.jpg
0
1048724
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/image_2021_05_31T07_10_04_897Z.png
0
1046736
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Veeam-thumbnail-1-sec.png
0
1023931
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/2021/Is+there+a+rift+in+your+software+development+and+security+teams.jpg
0
1002205
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/zero-trust11.jpg
0
961854
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/2021/hybrid-workplace1111.jpg
0
902355
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Callsign+-+Rethink+your+SMS+Approach.jpg
0
815810
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Running+outdated+software+on+your+server.jpg
0
724736
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/video-fortinet.jpg
0
652350
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/rep-ossra-2021.jpg
0
647157
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Rubrik-socmed.jpg
0
635871
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Cisco-thumbnail-1-q4.jpg
0
523098
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Peril+in+a+Pandemic_032221.jpg
0
511953
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-1+copy.jpg
0
479259
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-3-21111.jpg
0
397125
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-21111.jpg
0
311486
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/CYBERSECasia.fw.png
0
297456
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Fortinet+-+thumbnail-0017.jpg
0
271447
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Fortinet+-+thumbnail-001.jpg
0
254768
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/sparking.jpg
0
148102
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/online-banking.jpg
0
137213
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Quick+Link.png
0
118252
https://www.cybersecasia.net/wp-content/themes/Extra/core/admin/fonts/modules/all/modules.ttf
0
92637
https://sg.popin.cc/popin_discovery/recommend?mode=new&url=https%3A%2F%2Fwww.cybersecasia.net%2F&&device=mobile&media=www.cybersecasia.net&extra=android&agency=ENCE-sg&topn=200&ad=100&r_category=all&country=sg&redirect=true&rid=000000&uid=68fd96f846172df68fc1632731889401&info=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&callback=_p6_947e6a397570
0
23933
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/MartechAsia/Featured+Images/2021/TLM-logo.svg
0
20699
https://www.cybersecasia.net/wp-content/themes/Extra/fonts/ET-Extra.woff
0
14665
https://ma.zoho.com/hub/js/WebsiteAutomation.js
0
9329
https://ma.zoho.com/hub/js/MagicPopup.js?t=1632706691984
0
7171
https://ma.zoho.com/images/videoclose.png
0
3313
https://ma.zoho.com/js/dig.js
0
2479
https://ma.zoho.com/images/challangeiconenable.jpg
0
1314
https://ma.zoho.com/wa/PopupSignUpForm?callback=processData&pType=1&popupInfoMap_Id=591128000003363013&listId=18341bc8b8e7c8bb&signupFormId=18341bc8b8fcd0bd&m=getSignupUrl&zuid=2ac5d97184e3b631c6a73058460b2a736&from=WA&ind=0
0
1059
https://r.popin.cc/log.gif?type=related-th&uid=68fd96f846172df68fc1632731889401&url=https%3A%2F%2Fwww.cybersecasia.net%2F&t=1632706690517
0
308
https://api.popin.cc/popin_discovery5-min.js
3600000
43216
https://api.popin.cc/searchbox/cybersecasia.js
3600000
42685
https://api.popin.cc/td_js_sdk_171.js
3600000
13187
https://www.google-analytics.com/analytics.js
7200000
20399
https://s0.2mdn.net/879366/dfa7banner_html_inpage_rendering_lib_200_268.js
86400000
39484
https://s0.2mdn.net/879366/DcmEnabler_01_243.js
86400000
11520
https://www.gstatic.com/recaptcha/api2/logo_48.png
604800000
3127
https://www.gstatic.com/recaptcha/api2/logo_48.png
604800000
3127
https://sdki.truepush.com/sdk/v2.0.3/main.js
864000000
19234
https://sdki.truepush.com/sdk/v2.0.2/app.js
864000000
1083
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/abg_lite_fy2019.js
1209600000
8438
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/abg_lite_fy2019.js
1209600000
8438
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/abg_lite_fy2019.js
1209600000
8438
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/abg_lite_fy2019.js
1209600000
8376
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/client/window_focus_fy2019.js
1209600000
2161
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/client/window_focus_fy2019.js
1209600000
2161
https://tpc.googlesyndication.com/pagead/js/r20210922/r20110914/client/window_focus_fy2019.js
1209600000
2160
Avoid an excessive DOM size — 2,390 elements
A large DOM (Document Object Model) will increase memory usage, cause longer system calculations as well as costly layout reflows.
Statistic Element Value
Total DOM Elements
2390
Maximum DOM Depth
24
Maximum Child Elements
74
Reduce JavaScript execution time — 9.7 s
JavaScript (JS) execution time can be lowered by reducing the time required for parsing, compiling and executing JS. Delivering smaller JS payloads may help with this.
URL Total CPU Time (Ms) Script Evaluation (Ms) Script Parse (Ms)
https://www.cybersecasia.net/wp-includes/js/jquery/jquery.min.js?ver=3.6.0
5504.968
2229.704
5.608
https://www.gstatic.com/recaptcha/releases/tftmXwdbgCvrXiHxr5HGbIaL/recaptcha__en.js
2274.588
1933.952
191.876
https://www.cybersecasia.net/wp-content/plugins/popups-for-divi/scripts/ie-compat.min.js?ver=3.0.3
2217.328
444.912
1.128
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021092001.js?31062904
2058.5
1513.088
71.3
Unattributable
1926.0519999999
30.624
0.78
https://www.cybersecasia.net/
1556.688
114.668
26.132
https://www.cybersecasia.net/wp-content/themes/Extra/scripts/scripts.min.js?ver=4.10.8
983.82
181.848
19.432
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
817.468
711.8
26.016
https://tpc.googlesyndication.com/sodar/sodar2/224/runner.html
782.576
733.904
11.628
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LcOQLAUAAAAAJE6aHUcEpbVmTsNus99g_88TITd&co=aHR0cHM6Ly93d3cuY3liZXJzZWNhc2lhLm5ldDo0NDM.&hl=en&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=yb6x031l7bcw
361.192
296.968
10.372
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LcOQLAUAAAAAJE6aHUcEpbVmTsNus99g_88TITd&co=aHR0cHM6Ly93d3cuY3liZXJzZWNhc2lhLm5ldDo0NDM.&hl=en&v=tftmXwdbgCvrXiHxr5HGbIaL&size=invisible&cb=61t57hwk53ef
259.716
220.012
6.912
https://www.cybersecasia.net/wp-content/plugins/smart-slider-3/Public/SmartSlider3/Application/Frontend/Assets/dist/n2.min.js?ver=821e0c40
238.924
111.984
2.708
https://d0f71b9dc2f46b4ba84b44b161484ad3.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
119.644
31.864
16.032
https://www.googletagmanager.com/gtag/js?id=UA-145136419-1
103.572
84.412
10.72
https://api.popin.cc/popin_discovery5-min.js
96.62
69.304
13.628
https://s0.2mdn.net/dfp/1890797/4788317706/1630555304007/index.html
94.04
42.136
21.276
https://pagead2.googlesyndication.com/bg/WOdvqX5MrEWan8NE-dDT01W_bgveDh48divqo2Vh5b0.js
90.952
86.552
2.62
https://ma.zoho.com/wa/PopupSignUpForm?callback=processData&pType=1&popupInfoMap_Id=591128000003363013&listId=18341bc8b8e7c8bb&signupFormId=18341bc8b8fcd0bd&m=getSignupUrl&zuid=2ac5d97184e3b631c6a73058460b2a736&from=WA&ind=0
89.384
40.868
0.512
https://api.popin.cc/searchbox/cybersecasia.js
86.032
54.856
11.784
https://sg.popin.cc/popin_discovery/recommend?mode=new&url=https%3A%2F%2Fwww.cybersecasia.net%2F&&device=mobile&media=www.cybersecasia.net&extra=android&agency=ENCE-sg&topn=200&ad=100&r_category=all&country=sg&redirect=true&rid=000000&uid=68fd96f846172df68fc1632731889401&info=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&callback=_p6_947e6a397570
83.456
66.54
6.896
https://www.google-analytics.com/analytics.js
73.608
62.796
3.564
https://s0.2mdn.net/879366/dfa7banner_html_inpage_rendering_lib_200_268.js
71.064
61.828
6.648
https://securepubads.g.doubleclick.net/tag/js/gpt.js
66.584
56.652
4.968
https://tpc.googlesyndication.com/sodar/sodar2.js
61.364
56.752
1.756
https://www.cybersecasia.net/wp-content/themes/Extra/style.min.css?ver=4.10.8
57.136
0
0
Minimize main-thread work — 20.8 s
Main-thread work timing can be lowered by reducing the time required for parsing, compiling and executing JS. Delivering smaller JS payloads may help with this.
Category Time Spent (Ms)
Script Evaluation
9654.588
Style & Layout
5171.584
Other
2936.1439999999
Rendering
1307.192
Garbage Collection
601.252
Script Parsing & Compilation
568.82
Parse HTML & CSS
557.012
Ensure text remains visible during webfont load
Make use of the font-display CSS feature, which will ensure text is user-visible while webfonts are loading.
URL Potential Savings (Ms)
https://fonts.gstatic.com/s/roboto/v18/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
2.6380000635982
https://fonts.gstatic.com/s/roboto/v18/KFOlCnqEu92Fr1MmEU9fBBc4AMP6lQ.woff2
3.311000065878
https://fonts.gstatic.com/s/roboto/v18/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
3.4380001015961
https://fonts.gstatic.com/s/roboto/v18/KFOlCnqEu92Fr1MmEU9fBBc4AMP6lQ.woff2
2.7179999742657
Reduce the impact of third-party code — Third-party code blocked the main thread for 2,560 ms
It is advised to either limit, remove or delay the loading of redundant third-party code which may be significantly impacting load performance.
Third-Party Transfer Size (Bytes) Main-Thread Blocking Time (Ms)
1200271
1346.724
467450
996.864
64313
205.66
21668
7.708
40030
1.14
51316560
0
164868
0
Avoid `document.write()`
Avoid or limit the use of external scripts that are dynamically injected via 'document.write()' as users on slow connections will be delayed by tens of seconds.
Source
Image elements do not have explicit `width` and `height`
Reduce layout shifts and improve CLS by setting explicit width and height properties on image elements.
URL Failing Elements
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/phishing+kity.jpg
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Callsign+-+Rethink+your+SMS+Approach.jpg
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/DigiconAsia/Featured+Images/2021/Is+there+a+rift+in+your+software+development+and+security+teams.jpg
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Running+outdated+software+on+your+server.jpg
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/online-financial.jpg
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/zero-trust11.jpg
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/cyber-financial.jpg
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Quick+Link.png
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-21111.jpg
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Crowdstrike-thumbnail-21111.jpg
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Veeam-thumbnail-1-sec.png
https://s3-ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/online-banking.jpg
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/Homepage-DiamondSponsor-BT3.gif
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/hillstone-gold.gif
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/final-silver-synopsys.gif
https://s3.ap-southeast-1.amazonaws.com/cdn.thinklogicmarketing.com/CybersecAsia/Featured+Images/2021/claroty3.gif
https://www.cybersecasia.net/wp-content/uploads/2021/03/widget-homepage3.png
https://www.cybersecasia.net/wp-content/uploads/2021/09/Adopting-an-attacker-mindset-is-good-for-cybersecurity-440x264.jpg
73

Accessibility

Indicates how accessible the page is and highlights opportunities where the page can be made more accessible to users of cybersecasia.net. This includes details about various page attributes that can be optimized.

Navigation

`[accesskey]` values are unique
Access keys assist users with focusing on different parts of the page. Each access key should be unique for proper navigation.
The page contains a heading, skip link, or landmark region
It is advised to provide ways to bypass repetitive content, allowing users to navigate the page efficiently.
`[id]` attributes on active, focusable elements are unique
Ensure all focusable elements have a unique id value to allow them to be visible to users of assistive technologies, like a screen reader.
No element has a `[tabindex]` value greater than 0
Although technically valid, a tabindex value greater than 0 often creates frustrating experiences for users who rely on assistive technologies.

ARIA

`[aria-*]` attributes match their roles
Avoid mismatching 'aria-*' attributes and their 'role' value, as it invalidates the attribute.
`button`, `link`, and `menuitem` elements have accessible names
Without accessible names on elements, screen readers will default to announcing a generic name, which means your content will be less accessible to users who rely on screen readers.
`[aria-hidden="true"]` is not present on the document `<body>`
If aria-hidden=true is set on the document body, assistive technologies, like a screen reader will work inconsistently.
`[aria-hidden="true"]` elements do not contain focusable descendents
Interactive elements within an aria-hidden=true element are unavailable to users of assistive technologies, like a screen reader.
ARIA input fields have accessible names
Generic names are announced to users of assistive technologies, like a screen reader, when an input field does not have an accessible name specified.
ARIA `meter` elements have accessible names
Without accessible names on elements, screen readers will default to announcing a generic name, which means your content will be less accessible to users who rely on screen readers.
ARIA `progressbar` elements have accessible names
Without accessible names on elements, screen readers will default to announcing a generic name, which means your content will be less accessible to users who rely on screen readers.
`[role]`s have all required `[aria-*]` attributes
Some ARIA roles have required 'aria-*' attributes, which provide essential information about state and functionality.
Elements with an ARIA `[role]` that require children to contain a specific `[role]` have all required children.
Some ARIA parent roles cannot perform their intended functions if specific child roles are not used.
`[role]`s are contained by their required parent element
Some ARIA child roles cannot perform their intended functions if specific parent roles are not used.
`[role]` values are valid
All ARIA roles require valid values to perform their intended functions.
ARIA toggle fields have accessible names
Generic names are announced to users of assistive technologies, like a screen reader, when a toggle field does not have an accessible name specified.
ARIA `tooltip` elements have accessible names
Without accessible names on elements, screen readers will default to announcing a generic name, which means your content will be less accessible to users who rely on screen readers.
ARIA `treeitem` elements have accessible names
Without accessible names on elements, screen readers will default to announcing a generic name, which means your content will be less accessible to users who rely on screen readers.
`[aria-*]` attributes have valid values
ARIA attributes cannot be interpreted with invalid values when used by screen readers and other assistive technologies.
`[aria-*]` attributes are valid and not misspelled
ARIA attributes cannot be interpreted with invalid names when used by screen readers and other assistive technologies.

Names and labels

Buttons have an accessible name
Buttons become unusable as they are announced simply as "button" when the button does not have an accessible name, when used by screen readers and other assistive technologies.
Document has a `<title>` element
Search engines, screen reader users and other assistive technology users rely on the title to provide an overview of the page and to help determine if the page is relevant to their search.
No form fields have multiple labels
Having multiple labels for form fields can be confusing to assistive technologies, like a screen reader.
`<frame>` or `<iframe>` elements have a title
Screen reader users and other assistive technology users rely on frame titles to describe the contents of frames.
`<input type="image">` elements have `[alt]` text
Input buttons with alternative text assist screen readers and other assistive technology users to understand its purpose.
Form elements have associated labels
Screen readers and other assistive technologies rely on labels to properly announce form controls.
`<object>` elements have `[alt]` text
It is advised that alt text is used on '<object>' elements in order to provide meaning to screen reader and other assistive technology users, as these technologies are unable to translate non-text content.

Tables and lists

`<dl>`'s contain only properly-ordered `<dt>` and `<dd>` groups, `<script>`, `<template>` or `<div>` elements.
Screen readers and other assistive technologies may produce poor and inaccurate output when definition lists are not properly marked up.
Definition list items are wrapped in `<dl>` elements
In order for screen readers and other assistive technologies to properly announce definition list items ('<dt>' and '<dd>'), they must be wrapped in parent a '<dl>' element.
Lists contain only `<li>` elements and script supporting elements (`<script>` and `<template>`).
Use proper list structure to aid screen readers and other assistive technologies.
List items (`<li>`) are contained within `<ul>` or `<ol>` parent elements
In order for screen readers to announce list items, ensure that list items ('<li>') are contained within parent '<ul>' or '<ol>' tags.
Cells in a `<table>` element that use the `[headers]` attribute refer to table cells within the same table.
Screen readers and other assistive technologies have features to make navigating tables easier. Ensure that '<td>' cells using the headers attribute only refer to other cells in the same table, to improve screen reader user experience.
`<th>` elements and elements with `[role="columnheader"/"rowheader"]` have data cells they describe.
Screen readers and other assistive technologies have features to make navigating tables easier. Ensure that table headers refer to some set of cells, to improve screen reader user experience.

Internationalization and localization

`<html>` element has a `[lang]` attribute
It is advised to provide a lang attribute so that screen readers and other assistive technologies are guaranteed to announce the page's text correctly. When not provided, the user's default language setting will be used which may cause inaccuracies.
`<html>` element has a valid value for its `[lang]` attribute
Specify a valid BCP 47 language in order to help screen readers and other assistive technologies announce text properly.
`[lang]` attributes have a valid value
Specify a valid BCP 47 language on elements in order to help screen readers and other assistive technologies announce text properly.

Best practices

The document does not use `<meta http-equiv="refresh">`
Pages that refresh automatically cause a poor user experience as focus is directed back to the top of the page unexpectedly.

Audio and video

`<video>` elements contain a `<track>` element with `[kind="captions"]`
Cybersecasia.net may provide assistance to deaf or hearing-impaired users with captions on videos.

Contrast

Background and foreground colors do not have a sufficient contrast ratio.
Many (if not most) users find low-contrast text difficult or impossible to read.
Failing Elements

ARIA

ARIA IDs are not unique
Ensure all ARIA ID values are unique to prevent elements from being overlooked by assistive technologies, like a screen reader.
Failing Elements

Navigation

Heading elements are not in a sequentially-descending order
Properly order all headers and do not skip heading levels to better the navigation and readability for users of assistive technologies, like a screen reader.
Failing Elements

Names and labels

Image elements do not have `[alt]` attributes
Provide short and descriptive alternative text where possible on informative elements.
Failing Elements

Best practices

`[user-scalable="no"]` is used in the `<meta name="viewport">` element or the `[maximum-scale]` attribute is less than 5.
For users with low vision who rely on screen magnification, ensure that zooming is not disabled.
Failing Elements

Manual Checks

The page has a logical tab order
The visual layout should be logical in its tab order and users cannot focus elements that are offscreen.
Interactive controls are keyboard focusable
Ensure that custom interactive controls are keyboard focusable and that a focus indicator is displayed.
Interactive elements indicate their purpose and state
Ensure that interactive elements (such as links and buttons) are distinguishable from non-interactive elements and that they indicate their state.
The user's focus is directed to new content added to the page
When new content (such as a dialogue) is added to the page, the user's focus should be directed to it.
User focus is not accidentally trapped in a region
Avoid focus being accidentally trapped when a user tabs in and out of controls or regions on page.
Custom controls have associated labels
Ensure that custom interactive controls have associated labels, which are provided by aria-label and aria-labelledby attributes.
Custom controls have ARIA roles
Ensure that all custom interactive controls have appropriate ARIA roles.
Visual order on the page follows DOM order
Ensure that the DOM order matches with the page's visual order, in order to improve navigation for screen readers and other assistive technologies.
Offscreen content is hidden from assistive technology
Ensure that offscreen content is hidden through the use of "display:none" styling or the aria-hidden attribute.
HTML5 landmark elements are used to improve navigation
Elements such as <main> and <nav> are recommended as they are used by screen readers and other assistive technologies to improve keyboard navigation.
80

Best Practices

Indicates the recommended, best practices currently in place on the page and highlights the best practices that cybersecasia.net should incorporate. This includes practices such as protecting pages with HTTPS.

Audits

Links to cross-origin destinations are safe
Improve performance and prevent security vulnerabilities by adding rel="noopener" and rel="noreferrer" to external links.
Avoids requesting the geolocation permission on page load
When requesting a user's location, provide context or consider tying the request to a user action to avoid confusion and mistrust from users.
Avoids requesting the notification permission on page load
When requesting permission to send notifications, provide context or consider tying the request to a user action to avoid confusion and mistrust from users.
Avoids front-end JavaScript libraries with known security vulnerabilities
Ensure that the use of third-party scripts is minimal and that only trusted third-party scripts are used as some may contain known security vulnerabilities which may be exploited by attackers.
Ensure CSP is effective against XSS attacks
Significantly reduce the risk of cross-site scripting attacks (XSS) by ensuring you have a strong Content Security Policy (CSP).
Description Directive Severity
No CSP found in enforcement mode
High

Audits

Allows users to paste into password fields
Ensure that password inputs may be pasted into to aid in the user's ability to use password managers and improve security.
Displays images with correct aspect ratio
Ensure that image display dimensions match their natural aspect ratio.
Fonts with `font-display: optional` are preloaded
It is recommended that optional fonts are preloaded.

Audits

Page has the HTML doctype
Ensure a doctype is specified to prevent the browser from switching to quirks-mode.
Properly defines charset
It is advised to declare a character encoding, optionally via a <meta> tag in the first 1024 bytes of the HTML or in the Content-Type HTTP response header.

Audits

Avoids `unload` event listeners
The 'unload' event does not fire reliably, causing issues with browser optimizations such as the Back-Forward Cache. It is recommended that 'pagehide' or 'visibilitychange' events are used instead.
Avoids Application Cache
Application cache is deprecated and is no longer recommended.
Detected JavaScript libraries
Below is a list of all front-end JavaScript libraries that were detected on the page.
Name Version
jQuery
3.6.0
Underscore
1.13.1
WordPress
5.8.1
core-js
core-js-global@3.11.0; core-js-global@3.0.1; core-js-global@3.2.1
Avoids deprecated APIs
Avoid deprecated APIs which will eventually be removed the browser.
Page has valid source maps
Consider deploying source maps for added benefits such as the ability to debug while in production.
No issues in the `Issues` panel in Chrome Devtools
There may be unresolved issues logged to Chrome Devtools.

Audits

Does not use HTTPS — 1 insecure request found
Ensure that all pages are protected with HTTPS (including those that do not handle sensitive data) as HTTPS prevents tampering and passive listening on communications between the app and its users. Additionally, HTTPS is a prerequisite for HTTP/2 and many new web platform APIs.
Insecure URL Request Resolution
http://cybersecasia.net/
Allowed

Audits

Serves images with low resolution
For maximum image clarity, ensure images have natural dimensions and are proportional to the display size and pixel ratio.
URL Displayed size Actual size Expected size
https://www.cybersecasia.net/wp-content/uploads/2021/09/Dealing-with-%E2%80%98vulnerability-lag-284x170.jpg
352 x 211
284 x 170
704 x 422
https://www.cybersecasia.net/wp-content/uploads/2019/07/CYBERSECasia-logo.png
216 x 35
321 x 52
432 x 70

Audits

Browser errors were logged to the console
Below is a list of all errors logged to the console, which indicate unresolved problems on the site.
Source Description
Failed to load resource: the server responded with a status of 404 (Not Found)
Failed to load resource: the server responded with a status of 404 (Not Found)
Failed to load resource: the server responded with a status of 404 (Not Found)
Failed to load resource: the server responded with a status of 404 (Not Found)
Failed to load resource: the server responded with a status of 404 (Not Found)
Failed to load resource: the server responded with a status of 404 (Not Found)
Failed to load resource: the server responded with a status of 404 (Not Found)
Failed to load resource: the server responded with a status of 404 (Not Found)
Failed to load resource: the server responded with a status of 404 (Not Found)
Failed to load resource: the server responded with a status of 404 (Not Found)
Failed to load resource: the server responded with a status of 404 (Not Found)
Failed to load resource: the server responded with a status of 404 (Not Found)
TypeError: e.indexOf is not a function at S.fn.init.S.fn.load (https://www.cybersecasia.net/wp-includes/js/jquery/jquery.min.js?ver=3.6.0:2:84932) at HTMLDocument.<anonymous> (https://www.cybersecasia.net/wp-content/plugins/supreme-modules-for-divi/scripts/frontend-bundle.min.js?ver=2.4.0:1:4859) at e (https://www.cybersecasia.net/wp-includes/js/jquery/jquery.min.js?ver=3.6.0:2:30038) at t (https://www.cybersecasia.net/wp-includes/js/jquery/jquery.min.js?ver=3.6.0:2:30340)
77

SEO

Indicates how well the page is optimized for ranking in search engines and highlights Search Engine Optimization (SEO) opportunities for cybersecasia.net. This includes optimizations such as providing meta data.

Mobile Friendly

Has a `<meta name="viewport">` tag with `width` or `initial-scale`
It is advised to use a '<meta name="viewport">' tag for the optimization of cybersecasia.net on mobile screens.
Document uses legible font sizes — 96.59% legible text
Font sizes of 12px or less are too small to most mobile users without user gestures and further action. Aim for more than 60% of page text to use font sizes greater than 12px.
Source Selector % of Page Text Font Size
a, abbr, acronym, address, applet, article, aside, audio, b, big, blockquote, body, canvas, caption, center, cite, code, dd, del, details, dfn, div, dl, dt, em, embed, fieldset, figcaption, figure, footer, form, h1, h2, h3, h4, h5, h6, header, hgroup, html, i, iframe, img, ins, kbd, label, legend, li, mark, menu, nav, object, ol, output, p, pre, q, ruby, s, samp, section, small, span, strike, strong, sub, summary, sup, table, tbody, td, tfoot, th, thead, time, tr, tt, u, ul, var, video
3.04%
4.69333px
.rc-anchor-normal .rc-anchor-pt, .rc-anchor-invisible .rc-anchor-pt, .rc-anchor-compact .rc-anchor-pt
0.10%
8px
.rc-anchor-normal .rc-anchor-pt, .rc-anchor-invisible .rc-anchor-pt, .rc-anchor-compact .rc-anchor-pt
0.10%
8px
.rc-anchor-invisible-text .rc-anchor-pt a:link, .rc-anchor-invisible-text .rc-anchor-pt a:visited
0.09%
10px
.rc-anchor-invisible-text .rc-anchor-pt a:link, .rc-anchor-invisible-text .rc-anchor-pt a:visited
0.09%
10px
96.59%
≥ 12px

Content Best Practices

Document has a `<title>` element
Search engines, screen reader users and other assistive technology users rely on the title to provide an overview of the page and to help determine if the page is relevant to their search.
Document has a meta description
Meta descriptions may be used by search engines when displaying a link to the page and should concisely summarize the page's content.
Document has a valid `hreflang`
Search engines can be instructed to list specific versions of a page for a given language or region through the use of hreflang links.
Document has a valid `rel=canonical`
Search engines can be suggested which URL should be shown in search results through the use of canonical links.
Document avoids plugins
The content of plugins cannot be indexed by search engines and many devices either restrict or do not support them.

Crawling and Indexing

Page has successful HTTP status code
Avoid pages with unsuccessful HTTP status codes as they may not be indexed by search engines.
Page isn’t blocked from indexing
Pages that cannot be crawled by search engines cannot be indexed or included in their search results. Ensure that search engines have permission to crawl all pages that should be indexed.
robots.txt is valid
Malformed robots.txt files prevent crawlers from understanding how a site wants to be crawled or indexed, which can be devastating to SEO.

Content Best Practices

Links do not have descriptive text — 4 links found
Make use of descriptive link text to assist search engines in understanding the content.
Image elements do not have `[alt]` attributes
Provide short and descriptive alternative text where possible on informative elements.
Failing Elements

Crawling and Indexing

Manual Checks

Structured data is valid
Structured data can be validated through the use of the Structured Data Testing Tool and the Structured Data Linter.
42

Progressive Web App

Indicates how valid the aspects of a Progressive Web App (PWA) are for the page and highlights opportunities to enable/improve the PWA of cybersecasia.net. This includes details about web app manifests.

PWA Optimized

Redirects HTTP traffic to HTTPS
It is advised to redirect all HTTP traffic to HTTPS, in order to enable secure web features for all users.
Content is sized correctly for the viewport
Ensure that the width of the app's content matches the width of the viewport, otherwise the app might not be optimized for mobile screens.
Has a `<meta name="viewport">` tag with `width` or `initial-scale`
It is advised to use a '<meta name="viewport">' tag for the optimization of cybersecasia.net on mobile screens.

Installable

Web app manifest or service worker do not meet the installability requirements — 1 reason
User engagement may be increased by leveraging the browsers ability to proactively prompt users to add the app to their homescreen.
Failure reason
No manifest was fetched

PWA Optimized

Does not register a service worker that controls page and `start_url`
A service worker is used to provide Progressive Web Apps the use of features such as working offline, the ability for the app to be added to the homescreen as well as push notifications.
Is not configured for a custom splash screen
Themed splash screens ensure a high-quality user experience at launch for app users.
View Data
Does not set a theme color for the address bar.
A theme may be applied to the browser address bar, which ideally can be made to match the site.
View Data
Does not provide a valid `apple-touch-icon`
iOS users of Progressive Web Apps will benefit from an apple touch icon, which can be defined with 'apple-touch-icon', which must point to a non-transparent 192px (or 180px) square PNG.
Manifest doesn't have a maskable icon
Maskable icons are great to ensure that images fill the entire shape when installing the app on a device.

Manual Checks

Site works cross-browser
Ensure that the Progressive Web App works correctly across every major browser.
Page transitions don't feel like they block on the network
Users perceive apps with responsive, snappy transitions as higher peforming and ensures a great user experience, even on a slow network.
Each page has a URL
Ensure that all pages are deep linkable via URL. They should also be unique for the purpose of shareability on social media.
Hosting

Server Location

Server IP Address: 18.140.38.73
Continent: Asia
Country: Singapore
Singapore Flag
Region:
City: Singapore
Longitude: 103.8547
Latitude: 1.2929
Currencies: SGD
Languages: Mandarin
English
Malay
Tamil

Web Hosting Provider

Name IP Address
Amazon Technologies Inc.
Registration

Domain Registrant

Private Registration: Yes
Name: Registration Private
Organization: Domains By Proxy, LLC
Country: US
City: Scottsdale
State: Arizona
Post Code: 85260
Email: cybersecasia.net@domainsbyproxy.com
Phone: +1.4806242599
Note: Registration information is derived from various sources and may be inaccurate.

Domain Registrar

Name IP Address
Go Daddy, LLC 23.219.8.41
Security

Visitor Safety

Mature Content: Not Likely
McAfee WebAdvisor Rating: Safe
WOT Rating:
WOT Trustworthiness:
WOT Child Safety:
Note: Safety information is not guaranteed.

SSL/TLS Certificate

Issued To: cybersecasia.net
Issued By: R3
Valid From: 20th August, 2021
Valid To: 18th November, 2021
Subject: CN = cybersecasia.net
Hash: bb8a015b
Issuer: CN = R3
O = Let's Encrypt
S = US
Version: 2
Serial Number: 0x03CF524623B47C13D1F22669B8CA98FB439E
Serial Number (Hex): 03CF524623B47C13D1F22669B8CA98FB439E
Valid From: 20th August, 2025
Valid To: 18th November, 2025
Signature Algorithm (Short Name): RSA-SHA256
Signature Algorithm (Long Name): sha256WithRSAEncryption
Authority Key Identifier: keyid:14:2E:B3:17:B7:58:56:CB:AE:50:09:40:E6:1F:AF:9D:8B:14:C2:C6
Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication
Certificate Policies: Policy: 2.23.140.1.2.1
Policy: 1.3.6.1.4.1.44947.1.1.1
CPS: http://cps.letsencrypt.org

Authority Information Access: OCSP - URI:http://r3.o.lencr.org
CA Issuers - URI:http://r3.i.lencr.org/

SCT List: Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 5C:DC:43:92:FE:E6:AB:45:44:B1:5E:9A:D4:56:E6:10:
37:FB:D5:FA:47:DC:A1:73:94:B2:5E:E6:F6:C7:0E:CA
Timestamp : Aug 20 19:35:18.023 2021 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:46:02:21:00:FF:86:57:A1:99:43:3C:79:50:4E:D6:
15:A5:1F:2C:EA:A6:AD:6E:BD:A9:01:C6:A3:9A:A5:E2:
65:08:5E:FD:97:02:21:00:E8:20:68:61:E8:63:3F:88:
8D:A1:97:25:96:94:64:65:BE:87:B8:CA:62:02:F8:A7:
56:CD:56:DE:DD:2D:0B:8B
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 7D:3E:F2:F8:8F:FF:88:55:68:24:C2:C0:CA:9E:52:89:
79:2B:C5:0E:78:09:7F:2E:6A:97:68:99:7E:22:F0:D7
Timestamp : Aug 20 19:35:18.065 2021 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:44:02:20:5F:9B:0A:0A:43:3F:5C:07:48:5F:4D:B6:
76:C7:36:B5:AF:86:A8:D9:92:1C:39:4E:0A:88:FC:2B:
D8:3C:B8:11:02:20:3C:94:EC:A1:E5:98:BF:CE:C3:82:
A8:B9:AD:81:03:03:00:86:9C:3E:73:23:10:8F:3E:4A:
07:2F:B9:6F:E1:CF
Key Usage: Digital Signature, Key Encipherment
Basic Constraints: CA:FALSE
Subject Alternative Name: DNS:www.cybersecasia.net
DNS:cybersecasia.net
Technical

DNS Lookup

A Records

Host IP Address Class TTL
cybersecasia.net. 18.140.38.73 IN 600

NS Records

Host Nameserver Class TTL
cybersecasia.net. ns51.domaincontrol.com. IN 3600
cybersecasia.net. ns52.domaincontrol.com. IN 3600

MX Records

Priority Host Server Class TTL
15 cybersecasia.net. mx-serv.thinklogicmarketing.com. IN 600

SOA Records

Domain Name Primary NS Responsible Email TTL
cybersecasia.net. ns51.domaincontrol.com. dns.jomax.net. 3600

TXT Records

Host Value Class TTL
cybersecasia.net. facebook-domain-verification=1xhmj1b3g528qhive2b9dwue11s3kr IN 600
cybersecasia.net. v=spf1 IN 600
cybersecasia.net. google-site-verification=TRoLs2iIqAXY-9biI8DjNq40j0dr9WoskYlRoyHlNXk IN 600

HTTP Response Headers

HTTP-Code: HTTP/1.1 200 OK
Server: nginx
Date: 27th September, 2021
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
Vary: Accept-Encoding
X-Powered-By: PHP/7.4.16
Link: <https://www.cybersecasia.net/wp-json/>; rel="https://api.w.org/"

Whois Lookup

Created: 17th June, 2019
Changed: 18th June, 2021
Expires: 17th June, 2022
Registrar: GoDaddy.com, LLC
Status: clientTransferProhibited
clientUpdateProhibited
clientRenewProhibited
clientDeleteProhibited
Nameservers: ns51.domaincontrol.com
ns52.domaincontrol.com
Owner Name: Registration Private
Owner Organization: Domains By Proxy, LLC
Owner Street: DomainsByProxy.com
2155 E Warner Rd
Owner Post Code: 85284
Owner City: Tempe
Owner State: Arizona
Owner Country: US
Owner Phone: +1.4806242599
Owner Email: cybersecasia.net@domainsbyproxy.com
Admin Name: Registration Private
Admin Organization: Domains By Proxy, LLC
Admin Street: DomainsByProxy.com
2155 E Warner Rd
Admin Post Code: 85284
Admin City: Tempe
Admin State: Arizona
Admin Country: US
Admin Phone: +1.4806242599
Admin Email: cybersecasia.net@domainsbyproxy.com
Tech Name: Registration Private
Tech Organization: Domains By Proxy, LLC
Tech Street: DomainsByProxy.com
2155 E Warner Rd
Tech Post Code: 85284
Tech City: Tempe
Tech State: Arizona
Tech Country: US
Tech Phone: +1.4806242599
Tech Email: cybersecasia.net@domainsbyproxy.com
Full Whois: Domain Name: cybersecasia.net
Registry Domain ID: 2403059898_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.godaddy.com
Registrar URL: http://www.godaddy.com
Updated Date: 2021-06-18T13:54:23Z
Creation Date: 2019-06-17T02:43:44Z
Registrar Registration Expiration Date: 2022-06-17T02:43:44Z
Registrar: GoDaddy.com, LLC
Registrar IANA ID: 146
Registrar Abuse Contact Email: abuse@godaddy.com
Registrar Abuse Contact Phone: +1.4806242505
Domain Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
Domain Status: clientUpdateProhibited http://www.icann.org/epp#clientUpdateProhibited
Domain Status: clientRenewProhibited http://www.icann.org/epp#clientRenewProhibited
Domain Status: clientDeleteProhibited http://www.icann.org/epp#clientDeleteProhibited
Registry Registrant ID: Not Available From Registry
Registrant Name: Registration Private
Registrant Organization: Domains By Proxy, LLC
Registrant Street: DomainsByProxy.com
Registrant Street: 2155 E Warner Rd
Registrant City: Tempe
Registrant State/Province: Arizona
Registrant Postal Code: 85284
Registrant Country: US
Registrant Phone: +1.4806242599
Registrant Phone Ext:
Registrant Fax: +1.4806242598
Registrant Fax Ext:
Registrant Email: cybersecasia.net@domainsbyproxy.com
Registry Tech ID: Not Available From Registry
Tech Name: Registration Private
Tech Organization: Domains By Proxy, LLC
Tech Street: DomainsByProxy.com
Tech Street: 2155 E Warner Rd
Tech City: Tempe
Tech State/Province: Arizona
Tech Postal Code: 85284
Tech Country: US
Tech Phone: +1.4806242599
Tech Phone Ext:
Tech Fax: +1.4806242598
Tech Fax Ext:
Tech Email: cybersecasia.net@domainsbyproxy.com
Registry Admin ID: Not Available From Registry
Admin Name: Registration Private
Admin Organization: Domains By Proxy, LLC
Admin Street: DomainsByProxy.com
Admin Street: 2155 E Warner Rd
Admin City: Tempe
Admin State/Province: Arizona
Admin Postal Code: 85284
Admin Country: US
Admin Phone: +1.4806242599
Admin Phone Ext:
Admin Fax: +1.4806242598
Admin Fax Ext:
Admin Email: cybersecasia.net@domainsbyproxy.com
Name Server: NS51.DOMAINCONTROL.COM
Name Server: NS52.DOMAINCONTROL.COM
DNSSEC: unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of WHOIS database: 2021-09-27T01:36:41Z <<<

For more information on Whois status codes, please visit https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en

TERMS OF USE: The data contained in this registrar's Whois database, while believed by the
registrar to be reliable, is provided "as is" with no guarantee or warranties regarding its
accuracy. This information is provided for the sole purpose of assisting you in obtaining
information about domain name registration records. Any use of this data for any other purpose
is expressly forbidden without the prior written permission of this registrar. By submitting
an inquiry, you agree to these terms and limitations of warranty. In particular, you agree not
to use this data to allow, enable, or otherwise support the dissemination or collection of this
data, in part or in its entirety, for any purpose, such as transmission by e-mail, telephone,
postal mail, facsimile or other means of mass unsolicited, commercial advertising or solicitations
of any kind, including spam. You further agree not to use this data to enable high volume, automated
or robotic electronic processes designed to collect or compile this data for any purpose, including
mining this data for your own personal or commercial purposes. Failure to comply with these terms
may result in termination of access to the Whois database. These terms may be subject to modification
at any time without notice.

Nameservers

Name IP Address
ns51.domaincontrol.com 97.74.105.26
ns52.domaincontrol.com 173.201.73.26
Related

Subdomains

Similar Sites

Organic Search (US) Competitors

Backlink Competitors

Sites with the same domain name

Sites hosted on the same IP address

Domain Valuation Snoop Score
$1,029 USD 1/5
$1,044 USD 1/5