Frequently Asked Questions

APAC Cybersecurity Landscape & Challenges

What recent high-profile cyber incidents have impacted the APAC region?

Recent high-profile cyber incidents in APAC include the Latitude Financial breach, Medibank, Optus, MyDeal Retail, Telstra, and a supply chain attack affecting the New Zealand Ministry of Justice. These incidents highlight the urgent need for organizations in the region to prioritize cybersecurity measures. Source

How have cybersecurity regulations evolved in Australia and New Zealand recently?

Following major breaches, Australia increased financial penalties for privacy violations from AU.2 million to AU million or 30% of company turnover, whichever is greater. The Office of the Australian Information Commissioner (OAIC) now has expanded authority, and the Cyber Security Strategic Expert Advisory Board was established. In New Zealand, a supply chain attack led to government breaches, prompting increased focus on cybersecurity standards. Source

What are the main cybersecurity weak points for APAC organizations?

APAC organizations have shown weaknesses in protecting against data exfiltration, web application firewall (WAF), and web gateway-based breaches. Risk scores indicate these areas are more vulnerable compared to global counterparts, as highlighted in the Cymulate 2022 Cybersecurity Effectiveness Report. Source

How prevalent are cyber breaches in the APAC region?

According to Forrester, 68% of Asia Pacific (APAC) organizations were breached in 2021, indicating a high prevalence of cyber incidents and a need for improved preparedness. Source

What is driving increased cybersecurity spending in APAC?

Factors such as inadequate preparedness, tightening regulations, increased penalties, and an expanding threat landscape are driving a predicted 16.7% increase in security spending in APAC for 2023, with spending forecasted to reach US billion by 2026. Source

How do APAC organizations typically assess the value of their cyber investments?

APAC organizations are encouraged to measure the efficacy of their existing cybersecurity systems by validating the effectiveness of their solution stacks and security controls. Continuous validation, rather than one-off penetration testing, provides the granularity and continuity needed to assess resilience and optimize investments. Source

Why is continuous security validation important for APAC organizations?

Continuous security validation helps APAC organizations pinpoint underperforming security solutions, quantify risk exposure, and ensure comprehensive coverage across the cyber kill chain. This approach is essential for adapting to evolving threats and regulatory requirements in the region. Source

What role do boards and leadership play in APAC cybersecurity readiness?

Board-level engagement is critical. The 2022 Director Sentiment Survey in New Zealand found many boards were insufficiently prepared and adopted an 'it won’t happen to us' attitude, underscoring the need for proactive leadership in cybersecurity strategy. Source

How does the APAC region's wealth impact its cybersecurity risk?

Australia's high median wealth per adult makes it particularly attractive to cybercriminals, increasing the region's risk profile and emphasizing the need for robust cybersecurity measures. Source

What is the recommended approach for APAC organizations to strengthen cyber resilience?

APAC organizations are advised to adopt a unified exposure validation platform that spans the full cyber kill chain, enabling comprehensive validation of defenses, identification of security gaps, and actionable insights to strengthen resilience. Source

Product Information & Features

What is Cymulate and how does it help organizations?

Cymulate is a cybersecurity platform that empowers organizations to fortify their defenses through continuous assessment and validation of their security posture. It focuses on threat simulation, comprehensive security assessments, and provides actionable insights to stay ahead of cyber threats. Learn more

What are the key features of Cymulate's Exposure Validation platform?

Cymulate Exposure Validation offers advanced security testing, automated offensive simulations, and the ability to build custom attack chains. It provides a unified interface for validating detection, prevention, and IOC coverage. Learn more

How does Cymulate support continuous threat validation?

Cymulate runs 24/7 automated attack simulations to validate security defenses in real-time, ensuring proactive defense against emerging threats and providing actionable insights for remediation. Learn more

What types of attack vectors does Cymulate cover?

Cymulate covers the full cyber kill chain, including initial access, lateral movement, data exfiltration, privilege escalation, and more. This comprehensive coverage helps organizations identify and address vulnerabilities across all stages of an attack. Learn more

How does Cymulate help organizations optimize their existing security investments?

Cymulate enables organizations to validate the efficacy of their current security solutions, pinpoint underperforming controls, and fine-tune configurations to maximize ROI—sometimes revealing that additional investments are unnecessary. Learn more

What integrations does Cymulate offer?

Cymulate integrates with a wide range of security technologies, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, CrowdStrike Falcon, Cybereason, and more. For a full list, visit the Partnerships and Integrations page.

How easy is it to implement Cymulate?

Cymulate is designed for rapid deployment and ease of use. Customers report that implementation is fast and straightforward, with agentless mode, minimal resource requirements, and comprehensive support. Source

What technical documentation is available for Cymulate?

Cymulate provides whitepapers, guides, solution briefs, data sheets, and e-books covering topics like exposure management, CTEM, threat detection, and vulnerability management. Access all resources in the Resource Hub.

How does Cymulate ensure product security and compliance?

Cymulate is SOC2 Type II certified and compliant with ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1. It employs robust security practices, including secure AWS hosting, encryption, secure SDLC, and GDPR compliance. Learn more

Use Cases & Benefits

Who can benefit from using Cymulate?

Cymulate is designed for CISOs, security leaders, SecOps teams, red teams, and vulnerability management teams across industries such as finance, healthcare, retail, and more. It is suitable for organizations of all sizes, from small businesses to large enterprises. Learn more

What business impact can customers expect from Cymulate?

Customers typically see a 30% improvement in threat prevention, a 52% reduction in critical exposures, a 60% increase in team efficiency, and an 81% reduction in cyber risk within four months. Source

Are there case studies demonstrating Cymulate's effectiveness?

Yes. For example, Hertz Israel reduced cyber risk by 81% in four months, Nemours Children's Health improved detection and response, and a financial services organization automated testing across 10+ entities. See more case studies.

How does Cymulate address the pain points of APAC organizations?

Cymulate helps APAC organizations overcome overwhelming threats, lack of visibility, unclear prioritization, operational inefficiencies, fragmented tools, cloud complexity, and communication barriers by providing continuous threat validation, unified analytics, and actionable metrics. Learn more

How does Cymulate tailor its solutions for different security roles?

Cymulate provides validated exposure scoring and metrics for CISOs, automates processes for SecOps, offers scalable attack simulations for red teams, and prioritizes exposures for vulnerability management teams. Learn more

What customer feedback has Cymulate received about ease of use?

Customers praise Cymulate for its intuitive design, fast implementation, and user-friendly dashboard. Testimonials highlight the platform's simplicity and the effectiveness of its support team. Read testimonials

How does Cymulate help organizations communicate risk to stakeholders?

Cymulate provides validated exposure scoring and quantifiable metrics, enabling CISOs and security leaders to communicate risk and justify investments to stakeholders effectively. Learn more

What is Cymulate's approach to continuous threat exposure management (CTEM)?

Cymulate evolves security practices into CTEM by continuously validating controls, prioritizing vulnerabilities, and enabling measurable improvements in threat resilience and operational efficiency. Learn more

Pricing & Plans

What is Cymulate's pricing model?

Cymulate uses a subscription-based pricing model tailored to each organization's needs. Pricing depends on the chosen package, number of assets, and scenarios selected. For a custom quote, schedule a demo.

Competition & Comparison

How does Cymulate compare to AttackIQ?

Cymulate offers the industry's leading threat scenario library and AI-powered capabilities for streamlined workflows and accelerated security posture improvement. AttackIQ focuses on automated security validation but does not match Cymulate's innovation, threat coverage, or ease of use. Read more

How does Cymulate compare to Mandiant Security Validation?

Mandiant is an original BAS platform but has seen little innovation in recent years. Cymulate continually innovates with AI and automation, expanding into exposure management and recognized as a grid leader. Read more

How does Cymulate compare to Pentera?

Pentera is useful for attack path validation but lacks the depth Cymulate provides for fully assessing and strengthening defenses. Cymulate optimizes defense, scales offensive testing, and increases exposure awareness. Read more

How does Cymulate compare to Picus Security?

Picus may suit organizations seeking a BAS vendor with an on-prem option. Cymulate offers a more complete exposure validation platform covering the full kill chain and cloud control validation. Read more

How does Cymulate compare to SafeBreach?

Cymulate outpaces SafeBreach with unmatched innovation, precision, and automation. It features the industry’s largest attack library, a full CTEM solution, and comprehensive exposure validation. Read more

How does Cymulate compare to Scythe?

Scythe is suitable for advanced red teams building custom attack campaigns. Cymulate provides a more comprehensive exposure validation platform with actionable remediation and automated mitigation. Read more

How does Cymulate compare to NetSPI?

NetSPI excels in penetration testing as a service (PTaaS). Cymulate is designed for continuous, independent assessment and strengthening of defenses, recognized as a leader in exposure validation by Gartner and G2. Read more

Support & Resources

Where can I find Cymulate's blog and latest research?

Cymulate's blog covers the latest threats, research, and product updates. Visit the Cymulate blog for more information.

How can I subscribe to the Cymulate blog?

To subscribe to the Cymulate blog, you need to provide your full name, email address, and country of residence. Privacy Policy

Where can I find Cymulate's resource hub?

All Cymulate resources, including insights, thought leadership, and product information, are available in the Resource Hub.

Does Cymulate provide content on preventing lateral movement attacks?

Yes, Cymulate has a blog post titled 'Stopping Attackers in Their Tracks' that discusses common lateral movement attacks and prevention strategies. Read the blog post

Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

APAC Cybersecurity Wake-Up Call: Reinforcing Resilience is Key

By: Cymulate

Last Updated: June 23, 2025

cymulate blog article

The recent Latitude Financial breach’s fame is only due to its preeminence in APAC.  It is consistent with the 2022 spate of data breaches in APAC, starring Medibanks, Optus, MyDeal Retail, Telstra, and even the New Zealand government, that highlighted the urgent need for businesses to prioritize cybersecurity measures.  Many smaller, less famous, organizations are also taking hits, and, though their relative lack of fame protects them from making headlines, the damage they experience can be crippling.  

This growing cyber insecurity might be what underlines the trend to increase cybersecurity budget and spending, a trend reported by 64% of organizations, as reported by Kroll’s latest APAC State of Incident Response report 

Last year’s Medibank and Optus data breaches triggered the steep increase of financial penalty from AU$ 2.2 million to AU $ 50 million or 30% of the infringing company turnover, whichever is greater. It also increased the scope of the Office of the Australian Information Commissioner’s (OAIC) involvement in the privacy breach resolution and scope determination process and led to the creation of Australia’s Home Affairs Cyber Security Strategic Expert Advisory Board, headed by the former Telstra CEO Andy Penn. 

On April 11th, 2023, Latitude Financial announced that they would refuse to pay the ransom, as advised by the Australian Cyber Security Centre (ACSC). In line with Andy Penn’s recommendation, Australia Cyber Security Minister Clare O’Neil is now weighing outlawing the payment of ransom.

Last February, Penn underlined the potential national security impact of reliance on digital connectivity, especially in view of the growing number of interdependencies and the multiplication of actors involved in supply chains. “There are certain systems within our country”, he said, “that may or may not be in private hands, but that, if disrupted, could lead to an issue of national security.”

This, according to Penn, is at the core of the need for Australia to put in place minimum standards of cybersecurity, especially as the evolution of the threat landscape has outpaced the level of cybersecurity preparedness and that much more needs to be done. 

As the ACSC estimates that the downside of the often proudly reported Australian highest median wealth per adult in the world is that it makes Australia particularly attractive for cybercriminals. 

In New Zealand, last December, the government suffered a breach resulting from a supply chain attack, that affected the Ministry of Justice, among other governmental agencies, granting access to thousands of autopsy reports.  

APAC-Specific Cybersecurity Weak Points 

Data collected to create the Cymulate 2022 Cybersecurity Effectiveness Report indicated that APAC region organizations fared poorly in protecting against data exfiltration, web application firewall (WAF), and web gateway-based breaches compared to their global counterparts. The scores in the table below are the risk scores for each attack vector.  

Note: The risk score is based on an algorithm that analyzes attack simulation’s ability to evade detection and how far their attack path can progress unimpeded. The results are then correlated with NIST, DREAD, CVSS and MITRE ATT*CK severity scoring system. The risk score reflects the contextual risk score within an organization’s infrastructure, factoring in security controls’ ability to protect assets despite the presence of vulnerabilities or other security gaps.

In New Zealand, the 2022 Director Sentiment Survey report shows that a significant proportion of boards was insufficiently prepared yet adopted an “it won’t happen to us” approach. 

According to Forrester, 68% of Asia Pacific (APAC) organizations were breached in 2021, highlighting how the overall APAC region lacks preparation against cybersecurity breaches.

This combination of inadequate preparedness, tightening regulations, increased penalties, and expanded threat landscape are likely behind the predicted 16.7% increase in security spending for the region in 2023, forecasted to reach US$55 billion by 2026. 

How to Assess the Value of Cyber Investments 

The first step to identify where to invest additional money to shore up a cybersecurity system is to measure the efficacy of the existing one.

Although the cost of a cybersecurity defense system can be calculated by adding the cost of cybersecurity solutions and the wages of security and IT teams, determining the actual value of defensive solutions is much more complex.  

It requires validating the efficacy of solution stacks and SIEM and SOAR arrays, that all depend heavily on selecting and enforcing adequate security control policies for each solution. Validating exclusively through penetration testing lacks the granularity required to identify which solution stopped a particular attack and the continuity required to continuously evaluate resilience.  

Sometimes, this shows that there is no need to invest in yet more solutions, just fine-tuning the existing ones to get the desired results. 

Pinpointing underperforming security solutions and quantifying risk exposure calls for a robust, continuous security validation strategy, preferably driven by a unified platform. An effective exposure validation platform spans the full cyber kill chain, identifying gaps from initial access and lateral movement to data exfiltration. It enables organizations to validate their defenses comprehensively across exposed assets, escalation paths, command and control channels, and beyond - providing clear, actionable insights to strengthen cyber resilience.

Cymulate Exposure Validation makes advanced security testing fast and easy. When it comes to building custom attack chains, it's all right in front of you in one place.
Mike Humbert, Cybersecurity Engineer
DARLING INGREDIENTS INC.
Learn More
Book a Demo