Business Applications & Databases Digital threats and opportunities of borderless economies December 8, 2023
Cloud, Virtualization, Operating Environments and Middleware State of IT risk in Singapore December 6, 2023
Governance, Risk and Compliance PodChats for FutureCISO: Data immutability for regulatory compliance December 5, 2023
Customer Experience / Engagement Holiday havoc: Surge in cyber threats threatens festive season joy December 4, 2023
Governance, Risk and Compliance Golden ransomware rules for CIOs: Observe correct prevent and notify December 1, 2023
Big Data, Analytics & Intelligence PodChats for FutureCISO: The future state of passwordless authentication November 29, 2023
Governance, Risk and Compliance How do CIOs prepare smart energy systems for a secure future? November 22, 2023
Cloud, Virtualization, Operating Environments and Middleware Data strategies in the hybrid, multi-cloud normal November 16, 2023
Big Data, Analytics & Intelligence PodChats for FutureCISO: AI defence on both sides of the fence November 9, 2023
Cloud, Virtualization, Operating Environments and Middleware Curving the threat of cyberattacks in 2024 November 8, 2023
Governance, Risk and Compliance PodChats for FutureCISO: Securing corporate online relationships with zero trust October 20, 2023
Big Data, Analytics & Intelligence PodChats for FutureCISO: Securing Generative AI for enterprises October 17, 2023
Cloud, Virtualization, Operating Environments and Middleware Cloud adoption to spur SRM spending in 2024 October 10, 2023
Governance, Risk and Compliance PodChats for FutureCIO: Time for cyber resilience as a security posture September 26, 2023
Governance, Risk and Compliance Call for tools to improve regulatory oversight and monitoring September 21, 2023
Governance, Risk and Compliance PodChat for FutureCIO: Hurdles to the digitalisation of healthcare September 15, 2023
Governance, Risk and Compliance Gartner outlines three compliance function trends in 2023 September 6, 2023
Governance, Risk and Compliance Managing cyberattacks with standard cybersecurity measures September 6, 2023
Customer Experience / Engagement Mismanaged rights request can erode trust, warns Gartner September 4, 2023
Governance, Risk and Compliance PodChats for FutureCIO: Strategies for more effective real-time security August 29, 2023
Big Data, Analytics & Intelligence No excuse for unpreparedness as ransomware continues to plague APAC August 25, 2023
Big Data, Analytics & Intelligence Regulation is not stopping APAC from investing in GenAI, says IDC August 18, 2023
Governance, Risk and Compliance Why endpoint management is more critical than ever before August 16, 2023
Governance, Risk and Compliance The Essential Eight: Implementing the Australian cyber security centre's essential eight recommendations August 16, 2023
Governance, Risk and Compliance Information risk management – expectations versus reality August 16, 2023
Governance, Risk and Compliance Supply chain executives overestimate customer trust in supply chains August 14, 2023
Governance, Risk and Compliance Reframing your cyber hygiene for improved resilience beyond 2023 August 9, 2023
Governance, Risk and Compliance Identity security risks: Analysing danger zones in interconnected environments August 1, 2023
Governance, Risk and Compliance Software to account for half of all security spend globally July 29, 2023
Big Data, Analytics & Intelligence Risk factors are critical considerations when evaluating AI use cases July 28, 2023
Governance, Risk and Compliance Digitalisation boosts evidence management in law enforcement July 21, 2023
Big Data, Analytics & Intelligence Four areas for legal leaders must address around AI regulation July 11, 2023
Business Applications & Databases Use platform engineering to scale app security practices July 10, 2023
Governance, Risk and Compliance Navigating the security landmines of non-employee identities June 26, 2023
Governance, Risk and Compliance Report reveals new threat developments following post-covid return to normal June 16, 2023
Governance, Risk and Compliance PodChats for FutureCISO: Getting the board buy-in for cyber security in 2023 June 9, 2023
Governance, Risk and Compliance Gartner: Adopt a minimum effective mindset to maximise cybersecurity value June 8, 2023
Big Data, Analytics & Intelligence Balancing risks and governance when using Generative AI June 6, 2023
Big Data, Analytics & Intelligence ExecOpinion: Weaponizing Generative AI for good and evil June 2, 2023
Computer, Storage, Networks, Connectivity Valuable insights into cybersecurity, data protection and disaster recovery June 1, 2023
Cloud, Virtualization, Operating Environments and Middleware Simplify your business resiliency with a unified data resilience platform June 1, 2023
Governance, Risk and Compliance Taiwan-based Gamania Group adopts CyberArk identity security platform May 25, 2023
Corporate Social Responsibility Bain: ESG is yet to be embedded as best practice at banks May 23, 2023
Governance, Risk and Compliance Top 3 strategic priorities for security and risk management in 2023 May 23, 2023
Governance, Risk and Compliance ExecOpinion: Cybersecurity strategies - time to think outside the box May 9, 2023
Governance, Risk and Compliance Inefficiencies in legal practice result in delayed growth May 4, 2023
Governance, Risk and Compliance PodChats for FutureCISO: Risk quantification strategies in 2023 April 28, 2023
Governance, Risk and Compliance Strategies for achieving market success and mitigating financial risk April 19, 2023
Governance, Risk and Compliance PodChat for FutureCISO: Architecting security for an unknown future April 17, 2023
Governance, Risk and Compliance Security is the number one consideration among supply chain chiefs April 6, 2023
Governance, Risk and Compliance CISOs fail to use cyber risk quantification to drive decision-making April 3, 2023
Governance, Risk and Compliance Effective negotiation works to lower the cost of ransomware attacks March 24, 2023
Governance, Risk and Compliance The Defender's Advantage: a guide to activating cyber defence March 22, 2023
Governance, Risk and Compliance Tips for spotting reputational risk in non-traditional third-party relationships March 21, 2023
Cloud, Virtualization, Operating Environments and Middleware Aligning GreenOps with FinOps for a more holistic cloud strategy March 20, 2023
Governance, Risk and Compliance Architecting for meaningful data sovereignty strategies March 17, 2023
Governance, Risk and Compliance Security budgets undeterred by prevailing economic volatility and uncertainty March 15, 2023
Big Data, Analytics & Intelligence APAC’s healthcare needs data governance frameworks to move forward March 2, 2023
Business Applications & Databases Third-party risk management “misses” are hurting organisations March 1, 2023
Governance, Risk and Compliance Rethinking cybersecurity amid digital transformation February 22, 2023
Governance, Risk and Compliance Spending more on cybersecurity does not up your protection February 20, 2023
Governance, Risk and Compliance Values trump rules when it comes to ethics and compliance effectiveness February 9, 2023
Governance, Risk and Compliance IDC outlines top predictions for security and trust in 2023 February 8, 2023
Governance, Risk and Compliance Data sovereignty and compliance influence IT buying decisions February 3, 2023
Big Data, Analytics & Intelligence General counsel must address three trends in 2023 February 3, 2023
Governance, Risk and Compliance Singapore Police to develop financial forensic skills February 3, 2023
Computer, Storage, Networks, Connectivity What you don’t know can hurt you: expert advice on measuring risk February 2, 2023
Big Data, Analytics & Intelligence Customers need more reassurance about data privacy January 26, 2023
Governance, Risk and Compliance Cybersecurity outlook in 2023: Persistent threat is here to stay January 24, 2023
Governance, Risk and Compliance It’s time to rebalance your data protection equation January 12, 2023
Computer, Storage, Networks, Connectivity Three factors influencing security budgets in 2023 January 11, 2023
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCISO: Predicting the unpredictable January 9, 2023
Big Data, Analytics & Intelligence Readying the enterprise's data protection strategy in 2023 January 6, 2023
Governance, Risk and Compliance Cybersecurity spending is driven by endpoint products January 3, 2023
Computer, Storage, Networks, Connectivity PodChats for FutureCISO: Combating the rise of infostealers December 27, 2022
Big Data, Analytics & Intelligence PodChats for FutureCIO: Imperatives for CSCOs in 2023 December 23, 2022
Cloud, Virtualization, Operating Environments and Middleware Fundamentals to lateral security in 2023 December 23, 2022
Governance, Risk and Compliance Strategies for managing cybersecurity and risk in 2023 December 22, 2022
Big Data, Analytics & Intelligence Playing offence against ransomware with a modern data infrastructure December 20, 2022
Governance, Risk and Compliance A zero-trust future for businesses requires mindset transformation December 16, 2022
Computer, Storage, Networks, Connectivity Five steps to protect against ransomware in 2023 December 15, 2022
Governance, Risk and Compliance Talent crunch can derail advances in cybersecurity adoption in APAC December 14, 2022
Governance, Risk and Compliance PodChats for FutureCISO: State of mobile security in Asia December 13, 2022
Governance, Risk and Compliance Adopting a risk-based approach to managing cybersecurity December 6, 2022
Governance, Risk and Compliance PodChats for FutureCISO: Calibrating cybersecurity preparedness for 2023 November 28, 2022
Cloud, Virtualization, Operating Environments and Middleware VODChat: Building organisational resilience against cyber threats in 2023 November 22, 2022
Big Data, Analytics & Intelligence AI to fuel security spending privacy issues notwithstanding November 18, 2022
Governance, Risk and Compliance Cyberthreats and IT governance are top concerns for auditors in 2023 November 16, 2022
Governance, Risk and Compliance PodChats for FutureCIO: Securing data with key management systems November 15, 2022
Governance, Risk and Compliance Why global conflict is changing what it means to be cyber resilient November 14, 2022
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: Ransomware preparedness: Why we must plan November 14, 2022
Governance, Risk and Compliance Partnership to enhance OT network segmentation and compliance November 2, 2022
Governance, Risk and Compliance Security strategies among SEA businesses could be better October 31, 2022
Big Data, Analytics & Intelligence Boards see digital embedded in all growth strategies October 25, 2022
Governance, Risk and Compliance Legal departments are underusing maturing technologies October 20, 2022
Big Data, Analytics & Intelligence PodChats for FutureCIO: Data alone is not the answer October 14, 2022
Cloud, Virtualization, Operating Environments and Middleware Three vital steps to ensure business continuity before buying downtime insurance October 10, 2022
Governance, Risk and Compliance PodChats for FutureCISO: Taking passwordless authentication mainstream October 10, 2022
Finance & Insurance APAC’s critical infrastructure and growing financial sector to drive cybersecurity spending October 6, 2022
Governance, Risk and Compliance The disconnect between Board and CISOs weakening cyber defence strategies October 4, 2022
Governance, Risk and Compliance Updating cybersecurity awareness for the digital present September 30, 2022
Business Applications & Databases Digital payment surge offers a watershed moment for Philippine banking modernisation September 29, 2022
Governance, Risk and Compliance PodChats for FutureCISO: Breaking the cybersecurity glass barrier September 29, 2022
Customer Experience / Engagement Metaverse increase trust risks for enterprises and users September 23, 2022
Corporate Social Responsibility PodChats for FutureCIO: The role of IT and the CIO in driving sustainable ESG September 22, 2022
Computer, Storage, Networks, Connectivity Gartner says security vendor consolidation to improve risk posture September 21, 2022
Business Applications & Databases Emerging ransomware forces a hard look at the last line of defence September 16, 2022
Big Data, Analytics & Intelligence PodChats for FutureCIO: How DevOps practitioners see DevSecOps September 15, 2022
Big Data, Analytics & Intelligence Four paths to stay ahead of regulation in times of change September 14, 2022
Governance, Risk and Compliance The Game Plan: Tackling Asia’s untethered cyber threat September 14, 2022
Big Data, Analytics & Intelligence PodChats for FutureCISO: Improve cyber risk outcomes in distributed ecosystems September 12, 2022
Business Applications & Databases PodChats for FutureCIO: Addressing application vulnerability in the cloud era September 8, 2022
Governance, Risk and Compliance Geopolitical risks present 4 leadership opportunities for CIOs August 29, 2022
Governance, Risk and Compliance Study points to the prevalence of software supply chains in cloud-native apps August 18, 2022
Governance, Risk and Compliance PodChats for FutureCISO: Fundamentals of identity security August 8, 2022
Cloud, Virtualization, Operating Environments and Middleware Wiser tech investments give hope in reducing greenhouse gas August 1, 2022
Governance, Risk and Compliance Economic downturn tops emerging risk worrying executives July 26, 2022
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCISO: Identity security in the cloud July 21, 2022
Big Data, Analytics & Intelligence Cloud-driven breach detection device to arm cyber defenders July 18, 2022
Governance, Risk and Compliance PodChats for FutureCISO: Battling the darker side of bots July 15, 2022
Governance, Risk and Compliance Entry-level cyber security certification to close skills gap July 15, 2022
Governance, Risk and Compliance Deel launches in Singapore to empower organisations to hire and pay global talents remotely July 5, 2022
Customer Experience / Engagement CIAM is the simplest solution to reduce friction for user access June 30, 2022
Computer, Storage, Networks, Connectivity MFA and SSO are top zero-trust implementations June 29, 2022
Cloud, Virtualization, Operating Environments and Middleware Managing the rising risks of bad bots June 28, 2022
Governance, Risk and Compliance Half of zero trust adopters will fail to realise its benefits June 22, 2022
Customer Experience / Engagement Customers want personalisation but are wary of privacy violations June 16, 2022
Governance, Risk and Compliance Prepare for the evolution of cybersecurity strategy, roles and technology June 10, 2022
Big Data, Analytics & Intelligence PodChats for FutureCIO: Intelligently verifying digital identities June 7, 2022
Governance, Risk and Compliance PodChats for FutureCISO: CISO as security champion and partner to business June 7, 2022
Governance, Risk and Compliance Security risks rise alongside connectedness, says ABI Research June 3, 2022
Customer Experience / Engagement Consumer identity verification preference when shopping online May 31, 2022
Cloud, Virtualization, Operating Environments and Middleware Oracle ups the ante in cloud security-enhancing OCI offering May 31, 2022
Cloud, Virtualization, Operating Environments and Middleware Businesses more at risk after hybrid work and cloud admit CISOs May 18, 2022
Governance, Risk and Compliance Realistic cyber wargaming to up SG’s cyber response capability May 3, 2022
Big Data, Analytics & Intelligence PodChats for FutureCIO: Strategies for enhancing how tech supports ESG May 2, 2022
Governance, Risk and Compliance Phishing-as-a-Service presents a real and present danger April 22, 2022
Big Data, Analytics & Intelligence Sophisticated ransomware – the answer lies beyond the perimeter April 14, 2022
Governance, Risk and Compliance Board thinks security pros exaggerate threats and issues April 12, 2022
Governance, Risk and Compliance PodChats for FutureCISO: Futureproofing your Enterprise Incident Response in 2022 April 12, 2022
Governance, Risk and Compliance DLT: driving secure international trade by freeing data flows April 11, 2022
Cloud, Virtualization, Operating Environments and Middleware Looming cyber threats from the Russia-Ukraine war March 30, 2022
Governance, Risk and Compliance PodChats for FutureCISO: CISO in the crosshairs of security and privacy March 30, 2022
Business Applications & Databases 97% of IT systems in APAC can scam from legit messages March 30, 2022
Cloud, Virtualization, Operating Environments and Middleware Fewer IT leaders know where their data resides March 28, 2022
Governance, Risk and Compliance Call for universal data governance to address emerging technologies March 22, 2022
Big Data, Analytics & Intelligence PodChats for FutureCISO: How to get senior management buy-in March 22, 2022
Computer, Storage, Networks, Connectivity PodChats for FutureCIO: Addressing data protection gaps in 2022 March 16, 2022
Governance, Risk and Compliance Gartner outlines seven security and risk trends for 2022 March 10, 2022
Cloud, Virtualization, Operating Environments and Middleware Manufacturers bear brunt of cyberattacks in 2021 March 2, 2022
Governance, Risk and Compliance Employees’ tech habits present danger to APAC businesses February 25, 2022
Governance, Risk and Compliance Human-in-the-loop: central to Legal Tech automation February 21, 2022
Big Data, Analytics & Intelligence PodChats for FutureCIO: Why patch management matters in 2022 February 14, 2022
Big Data, Analytics & Intelligence Covid-induces fraud surge drives analytic innovation across industries February 14, 2022
Governance, Risk and Compliance Tight integration may be the route to better security posture February 11, 2022
Governance, Risk and Compliance Government should do more to protect against cyber risks February 10, 2022
Governance, Risk and Compliance 2021’s security vulnerabilities may predict what’s coming in 2022 February 10, 2022
Governance, Risk and Compliance Advanced remediation to minimise vulnerability risks February 4, 2022
Finance & Insurance PodChats for FutureCIO: Combating fraud risks in financial services in 2022 January 31, 2022
Governance, Risk and Compliance Phishing threats masking under Omicron label are rising fast January 27, 2022
Big Data, Analytics & Intelligence APAC businesses seek better ways to protect vulnerable customers January 19, 2022
Big Data, Analytics & Intelligence PodChats for FutureCIO: Making better decisions with data January 17, 2022
Computer, Storage, Networks, Connectivity PodChats for FutureCIO: Where XDR fits in data protection strategies January 12, 2022
Big Data, Analytics & Intelligence PodChats for FutureCIO: Best practices to ensure AI fairness January 10, 2022
Governance, Risk and Compliance Third-party risk management strategies: See risk, solve problems, report results December 29, 2021
Business Applications & Databases The impact of enterprise-class domain registrar on your overall security rating December 29, 2021
Governance, Risk and Compliance Complete guide to building your third-party risk management December 29, 2021
Business Applications & Databases FutureCISO Security Alert: Understanding Log4J vulnerabilities December 24, 2021
Governance, Risk and Compliance PodChats for FutureCIO: Bracing for ransomware in 2022 December 24, 2021
Computer, Storage, Networks, Connectivity Barracuda shares security predictions for 2022 December 22, 2021
Governance, Risk and Compliance Barracuda checklists for defending against ransomware December 21, 2021
Governance, Risk and Compliance Don’t pay the ransom: A three-step guide to ransomware protection December 21, 2021
Business Applications & Databases FutureCISO Security Alert: Worst cyber security vulnerability December 20, 2021
Governance, Risk and Compliance PodChats for FutureCIO: Learnings from Singapore’s cyber readiness December 20, 2021
Governance, Risk and Compliance Palo Alto Networks’ 5 cybersecurity predictions for APAC in 2022 December 10, 2021
Governance, Risk and Compliance More destructive broader-based cyberattacks in 2022 November 29, 2021
Governance, Risk and Compliance Ransomware and phishing trends & how to mitigate them November 26, 2021
Governance, Risk and Compliance Designing blockchain smart contract security and access control November 22, 2021
Big Data, Analytics & Intelligence From protection to prevention: Insurance’s new era November 22, 2021
Big Data, Analytics & Intelligence PodChats for FutureCIO: The financial services paradigm post-pandemic November 22, 2021
Governance, Risk and Compliance 3 steps for SROs to lead from an offensive position November 19, 2021
Governance, Risk and Compliance Cyberattacks more successful on holidays and weekends November 18, 2021
Cloud, Virtualization, Operating Environments and Middleware PKI drivers, restraints, opportunities, and challenges in 2022 November 12, 2021
Computer, Storage, Networks, Connectivity PodChats for FutureCIO: CISO tactics to enhance cyber threat readiness November 8, 2021
Governance, Risk and Compliance Integrating NIST’s 5 best practices in cyber threat mitigation October 28, 2021
Business-IT Alignment Predictions 2022: critical transformations to compete in a digital-first world October 28, 2021
Big Data, Analytics & Intelligence IDC outlines the future of enterprise resiliency and spending October 26, 2021
Governance, Risk and Compliance ESG risk and reporting creating new market opportunities October 25, 2021
Governance, Risk and Compliance Aggressive cyber threats fuel demand for XDR solutions October 22, 2021
Big Data, Analytics & Intelligence What a DX-sustainability combo brings to manufacturers October 19, 2021
Governance, Risk and Compliance Privacy regulation to up cost for data-driven businesses October 19, 2021
Governance, Risk and Compliance HK businesses notch up their cyber security readiness October 13, 2021
Business Applications & Databases Plugging the security compliance gap with automation October 13, 2021
Big Data, Analytics & Intelligence ESG is a top risk and opportunity for the mining sector October 12, 2021
Governance, Risk and Compliance Cyber threats fuel vulnerability management market, says Frost October 11, 2021
Governance, Risk and Compliance Prevention is the best approach to ransomware protection October 7, 2021
Big Data, Analytics & Intelligence How Bangkok Bank achieves global AML-compliant operations October 6, 2021
Customer Experience / Engagement Security and compliance: top areas for trust perception October 4, 2021
Governance, Risk and Compliance SG to get dual certification in data protection and data trust September 30, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: Understanding the 5 3s of multi-cloud Strategies September 29, 2021
Governance, Risk and Compliance Three areas for Legal & Compliance to focus technology investments September 29, 2021
Governance, Risk and Compliance Cloud-native architecture prove resilient against cyber attacks September 24, 2021
Computer, Storage, Networks, Connectivity PodChats for FutureCIO: data storage trends and opportunities post-COVID September 21, 2021
Governance, Risk and Compliance FutureCISO Security Alert: UN hacking a case of basic security hygiene ignored? September 20, 2021
Governance, Risk and Compliance FutureCISO Security Alert: automated bot attacks unleashed September 17, 2021
Governance, Risk and Compliance Patch management and password policies can cut cyber risks by 60% September 16, 2021
Governance, Risk and Compliance IDC lists four drivers of security spending in APAC September 8, 2021
Governance, Risk and Compliance More APAC businesses uncertain over cybersecurity defences in 2021 September 6, 2021
Governance, Risk and Compliance PodChats for FutureCIO: Top challenges for CISOs in Asia September 5, 2021
Governance, Risk and Compliance Accelerated DevOps drawing DDOS attacks, observed Imperva September 4, 2021
Governance, Risk and Compliance Why you need a prevention-first approach to cybersecurity September 3, 2021
Corporate Social Responsibility Major re-wiring of ESG thinking required to achieve ‘Alpha with Impact’ September 1, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: Cloud considerations for capital market firms in Asia August 31, 2021
Computer, Storage, Networks, Connectivity Ransomware strategies in 2021 – new playbook required August 30, 2021
Cloud, Virtualization, Operating Environments and Middleware How UES protects against shifting environments August 23, 2021
Big Data, Analytics & Intelligence Celcom says data governance is key to its digital transformation August 17, 2021
Governance, Risk and Compliance FutureCISO Security Alert: Application vulnerabilities are fodder to ransomware attacks August 16, 2021
Governance, Risk and Compliance PodChats for FutureCIO: Balancing between privacy and innovation August 16, 2021
Computer, Storage, Networks, Connectivity PodChats for FutureCIO: Weaponization of Operational Technology August 10, 2021
Governance, Risk and Compliance Staying a few steps ahead of intensifying security challenges August 9, 2021
Governance, Risk and Compliance Connecting the dots: Cyberattacks on SEA telcos linked to espionage August 4, 2021
Governance, Risk and Compliance FutureCISO Security Alert: Cyberattacks aimed at everyone in the enterprise August 3, 2021
Big Data, Analytics & Intelligence Comprehensive security strategy needed to reduce risk July 27, 2021
Governance, Risk and Compliance Cloud accelerates identity authentication access market July 26, 2021
Governance, Risk and Compliance Lack of governance threatens the effectiveness of ESG initiatives July 16, 2021
Big Data, Analytics & Intelligence MAS outlines data governance for public cloud environments July 16, 2021
Big Data, Analytics & Intelligence Singapore’s MAS is hunting for responsible AI solutions July 15, 2021
Cloud, Virtualization, Operating Environments and Middleware FutureCISO Security Alert: $70 million to stop the attack on Kaseya July 7, 2021
Corporate Social Responsibility Gartner outlines 4 working models for chief compliance officer June 29, 2021
Big Data, Analytics & Intelligence FutureCISO Security Alert: A malware by any other name June 28, 2021
Customer Experience / Engagement Remote onboarding to fuel digital identity verification market June 24, 2021
Governance, Risk and Compliance FutureCISO Security Alert: Unauthorised access accounts for 43% of all breaches globally June 21, 2021
Governance, Risk and Compliance 17 years later, enterprises still struggle to secure BYOD June 21, 2021
Big Data, Analytics & Intelligence Digital reliance leaves lingering security side effects June 17, 2021
Customer Experience / Engagement PodChats for FutureCIO: Privacy when building a sustainable customer engagement strategy June 16, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: getting to passwordless authentication June 8, 2021
Governance, Risk and Compliance PodChats for FutureCIO: The winning combination in privacy and resilience June 1, 2021
Big Data, Analytics & Intelligence Right data and meaningful AI is critical to cybersecurity May 24, 2021
Big Data, Analytics & Intelligence Next steps in model risk management in Southeast Asia May 23, 2021
Big Data, Analytics & Intelligence How AI and machine learning are redefining anti-money laundering May 23, 2021
Governance, Risk and Compliance FutureCISO Security Alert: The consequence of wilful ignorance of cyber risks May 19, 2021
Cloud, Virtualization, Operating Environments and Middleware Why financial institutions need a cloud-native backup strategy April 30, 2021
Cloud, Virtualization, Operating Environments and Middleware CrowdStrike expands end-to-end security through partner integration April 29, 2021
Cloud, Virtualization, Operating Environments and Middleware SaaS-based cyber threat intelligence to get crowded April 21, 2021
Business Applications & Databases FutureCISO Security alert: Check your apps for vulnerable opensource parts April 17, 2021
Governance, Risk and Compliance FutureCISO Security alert: Users are getting good at detecting intrusions April 16, 2021
Governance, Risk and Compliance 6 reasons to automate PKI to increase productivity in 2021 April 14, 2021
Governance, Risk and Compliance Digital identity: the broken foundation of a thriving global online economy April 8, 2021
Governance, Risk and Compliance Gartner’s takeaways for security & risk management for APAC in 2021 April 5, 2021
Governance, Risk and Compliance Systemic security issues that hinder successful transformation April 2, 2021
Cloud, Virtualization, Operating Environments and Middleware How to overcome hybrid cloud concerns March 30, 2021
Governance, Risk and Compliance Gartner’s top security and risk management trends for 2021 March 29, 2021
Governance, Risk and Compliance Use of vaccine passports in the workplace opens new can of worms March 23, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: Building a cloud strategy that supports resilience and growth March 22, 2021
Governance, Risk and Compliance Compliance leaders to do more with less as spending plateaued in 2020 March 19, 2021
Big Data, Analytics & Intelligence APAC FIs don’t mind violating AML rules, says ComplyAdvantage February 16, 2021
Finance PodChats for FutureCIO: IT’s role in mitigating the risks of financial crime February 11, 2021
Business-IT Alignment IDC lays top 10 digital trends for Australia for 2021 and beyond February 10, 2021
Cloud, Virtualization, Operating Environments and Middleware What will 2021 bring for IT and IT people? February 3, 2021
Corporate Social Responsibility CMOs call greater participation in solving societal issues February 3, 2021
Governance, Risk and Compliance IRM 2021: Prepare for a year of uncertainty and change February 2, 2021
Governance, Risk and Compliance Over 60% of GC companies purposely at risk of technology failures January 20, 2021
Big Data, Analytics & Intelligence PodChats for FutureCIO: CTO as the driver of digital transformation January 19, 2021
Business Applications & Databases Gartner ranks IT governance as the top risk for 2021 November 23, 2020
Business Applications & Databases Video: Top 10 digital transformation predictions for 2021 November 6, 2020
Governance, Risk and Compliance PodChats for FutureCIO: Application modernisation in the digital era October 27, 2020
Big Data, Analytics & Intelligence Better customer service to come with better governance October 6, 2020
Finance & Insurance EY lists survival tactics for Hong Kong’s financial services industry September 18, 2020
Finance & Insurance ZA Bank automates screening of banking transactions with Accuity September 18, 2020
Big Data, Analytics & Intelligence Podchats for FutureCIO: Simplifying the story of data management September 8, 2020
Business Applications & Databases Time-to-market pressures ups risks for substandard apps August 19, 2020
Governance, Risk and Compliance CISO Alert: COVID-19 vaccine – a new playground for threat actors August 13, 2020
Big Data, Analytics & Intelligence Coming in the future soon maybe: global healthcare interoperability August 3, 2020
Big Data, Analytics & Intelligence DBS’ four design principles in building its enterprise data platform July 23, 2020
Big Data, Analytics & Intelligence eDiscovery drives digital transformation in legal practice, says IDC July 22, 2020
Governance, Risk and Compliance Gartner reveals average 5-week delay costs $99 million opportunity July 8, 2020
Business Applications & Databases Everything you need to know when automating invoice processing July 3, 2020
Finance & Insurance COVID-19 calls for enhanced liquidity and risks management among APAC banks June 16, 2020