Governance, Risk and Compliance Taiwan-based Gamania Group adopts CyberArk identity security platform May 25, 2023
Big Data, Analytics & Intelligence Six ChatGPT Risks legal and compliance leaders must evaluate May 24, 2023
Governance, Risk and Compliance ExecOpinion: Cybersecurity strategies - time to think outside the box May 9, 2023
Governance, Risk and Compliance PodChats for FutureCISO: Risk quantification strategies in 2023 April 28, 2023
Cloud, Virtualization, Operating Environments and Middleware IBM, Cisco unveiled new TDR offering April 27, 2023
Business Applications & Databases GitHub delivers private vulnerability reporting at scale April 25, 2023
Cloud, Virtualization, Operating Environments and Middleware Akamai fortifies API security with Neosec acquisition April 21, 2023
Governance, Risk and Compliance PodChat for FutureCISO: Architecting security for an unknown future April 17, 2023
Governance, Risk and Compliance Security is the number one consideration among supply chain chiefs April 6, 2023
Governance, Risk and Compliance CISOs fail to use cyber risk quantification to drive decision-making April 3, 2023
Cloud, Virtualization, Operating Environments and Middleware More APJ firms eye revamp of their primary data protection solution March 30, 2023
Governance, Risk and Compliance Effective negotiation works to lower the cost of ransomware attacks March 24, 2023
Governance, Risk and Compliance The Defender's Advantage: a guide to activating cyber defence March 22, 2023
Computer, Storage, Networks, Connectivity Next-gen deep packet inspection tools are here March 17, 2023
Governance, Risk and Compliance Architecting for meaningful data sovereignty strategies March 17, 2023
Governance, Risk and Compliance Security budgets undeterred by prevailing economic volatility and uncertainty March 15, 2023
Governance, Risk and Compliance Spending more on cybersecurity does not up your protection February 20, 2023
Governance, Risk and Compliance IDC outlines top predictions for security and trust in 2023 February 8, 2023
Computer, Storage, Networks, Connectivity ZTE’s 5G NR product obtained NESAS cybersecurity certification February 8, 2023
Governance, Risk and Compliance Singapore Police to develop financial forensic skills February 3, 2023
Cloud, Virtualization, Operating Environments and Middleware The future of endpoint management February 2, 2023
Computer, Storage, Networks, Connectivity What you don’t know can hurt you: expert advice on measuring risk February 2, 2023
Cloud, Virtualization, Operating Environments and Middleware The Game Plan: Strategies for moving beyond patchwork IT January 31, 2023
Big Data, Analytics & Intelligence Customers need more reassurance about data privacy January 26, 2023
Governance, Risk and Compliance Cybersecurity outlook in 2023: Persistent threat is here to stay January 24, 2023
Governance, Risk and Compliance It’s time to rebalance your data protection equation January 12, 2023
Computer, Storage, Networks, Connectivity Three factors influencing security budgets in 2023 January 11, 2023
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCISO: Predicting the unpredictable January 9, 2023
Big Data, Analytics & Intelligence Readying the enterprise's data protection strategy in 2023 January 6, 2023
Cloud, Virtualization, Operating Environments and Middleware How hybrid cloud can improve performance and data regulation January 4, 2023
Governance, Risk and Compliance Cybersecurity spending is driven by endpoint products January 3, 2023
Computer, Storage, Networks, Connectivity PodChats for FutureCISO: Combating the rise of infostealers December 27, 2022
Cloud, Virtualization, Operating Environments and Middleware Fundamentals to lateral security in 2023 December 23, 2022
Governance, Risk and Compliance Strategies for managing cybersecurity and risk in 2023 December 22, 2022
Big Data, Analytics & Intelligence Playing offence against ransomware with a modern data infrastructure December 20, 2022
Big Data, Analytics & Intelligence Investment priorities for APAC businesses in 2023 December 19, 2022
Governance, Risk and Compliance A zero-trust future for businesses requires mindset transformation December 16, 2022
Computer, Storage, Networks, Connectivity Five steps to protect against ransomware in 2023 December 15, 2022
Governance, Risk and Compliance Talent crunch can derail advances in cybersecurity adoption in APAC December 14, 2022
Governance, Risk and Compliance PodChats for FutureCISO: State of mobile security in Asia December 13, 2022
Governance, Risk and Compliance Adopting a risk-based approach to managing cybersecurity December 6, 2022
Computer, Storage, Networks, Connectivity Unregistered devices give HK firms a cybersecurity headache December 2, 2022
Cloud, Virtualization, Operating Environments and Middleware 98% of firms use cloud in data protection strategy December 1, 2022
Customer Experience / Engagement Digital trust “extremely important” among APAC consumers November 30, 2022
Governance, Risk and Compliance PodChats for FutureCISO: Calibrating cybersecurity preparedness for 2023 November 28, 2022
Cloud, Virtualization, Operating Environments and Middleware Ten common cloud strategy mistakes November 24, 2022
Cloud, Virtualization, Operating Environments and Middleware VODChat: Building organisational resilience against cyber threats in 2023 November 22, 2022
Big Data, Analytics & Intelligence AI to fuel security spending privacy issues notwithstanding November 18, 2022
Governance, Risk and Compliance PodChats for FutureCIO: Securing data with key management systems November 15, 2022
Security Why immutable data storage is an integral part of a CISO’s IT security strategy November 14, 2022
Governance, Risk and Compliance Why global conflict is changing what it means to be cyber resilient November 14, 2022
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: Ransomware preparedness: Why we must plan November 14, 2022
Computer, Storage, Networks, Connectivity SG firms carry psychological burden from cyberattacks November 14, 2022
Governance, Risk and Compliance Partnership to enhance OT network segmentation and compliance November 2, 2022
Governance, Risk and Compliance Security strategies among SEA businesses could be better October 31, 2022
Government and Public Services Government digitisation to fuel mobile identity growth October 28, 2022
Business Applications & Databases PodChats for FutureCIO: Futureproofing the enterprise’s modernisation journey October 25, 2022
Business Applications & Databases Time to reimagine assumptions and turn uncertainty into certainty October 21, 2022
Business Applications & Databases ExecOpinion: APIs as new vectors of vulnerabilities October 11, 2022
Governance, Risk and Compliance PodChats for FutureCISO: Taking passwordless authentication mainstream October 10, 2022
Finance & Insurance APAC’s critical infrastructure and growing financial sector to drive cybersecurity spending October 6, 2022
Governance, Risk and Compliance The disconnect between Board and CISOs weakening cyber defence strategies October 4, 2022
Infrastructure & Platforms Study: 90% of SG enterprises have siloed cybersecurity model September 30, 2022
Governance, Risk and Compliance Updating cybersecurity awareness for the digital present September 30, 2022
Governance, Risk and Compliance PodChats for FutureCISO: Breaking the cybersecurity glass barrier September 29, 2022
Computer, Storage, Networks, Connectivity Rising confidence in securing hybrid work but security concerns remain September 28, 2022
Customer Experience / Engagement Metaverse increase trust risks for enterprises and users September 23, 2022
Computer, Storage, Networks, Connectivity Gartner says security vendor consolidation to improve risk posture September 21, 2022
Infrastructure & Platforms Check Point brings prevention-first approach to security operations September 19, 2022
Big Data, Analytics & Intelligence PodChats for FutureCIO: Future-proofing your modernisation journey with AI September 19, 2022
Business Applications & Databases Emerging ransomware forces a hard look at the last line of defence September 16, 2022
Big Data, Analytics & Intelligence PodChats for FutureCIO: How DevOps practitioners see DevSecOps September 15, 2022
Governance, Risk and Compliance The Game Plan: Tackling Asia’s untethered cyber threat September 14, 2022
Big Data, Analytics & Intelligence PodChats for FutureCISO: Improve cyber risk outcomes in distributed ecosystems September 12, 2022
Business Applications & Databases PodChats for FutureCIO: Addressing application vulnerability in the cloud era September 8, 2022
Cloud, Virtualization, Operating Environments and Middleware IT security, cloud, and DX rank high on Australian enterprises in 2022 September 6, 2022
Governance, Risk and Compliance Geopolitical risks present 4 leadership opportunities for CIOs August 29, 2022
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCISO: Futureproofing network security August 19, 2022
Governance, Risk and Compliance Study points to the prevalence of software supply chains in cloud-native apps August 18, 2022
Governance, Risk and Compliance PodChats for FutureCISO: Fundamentals of identity security August 8, 2022
Cloud, Virtualization, Operating Environments and Middleware Sapporo City deploys Nutanix Cloud Clusters on AWS August 2, 2022
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCISO: Identity security in the cloud July 21, 2022
Big Data, Analytics & Intelligence Cloud-driven breach detection device to arm cyber defenders July 18, 2022
Governance, Risk and Compliance PodChats for FutureCISO: Battling the darker side of bots July 15, 2022
Governance, Risk and Compliance Entry-level cyber security certification to close skills gap July 15, 2022
Customer Experience / Engagement CIAM is the simplest solution to reduce friction for user access June 30, 2022
Computer, Storage, Networks, Connectivity Security and ESG concerns affect data centre growth June 30, 2022
Computer, Storage, Networks, Connectivity MFA and SSO are top zero-trust implementations June 29, 2022
Cloud, Virtualization, Operating Environments and Middleware Managing the rising risks of bad bots June 28, 2022
Governance, Risk and Compliance Half of zero trust adopters will fail to realise its benefits June 22, 2022
Customer Experience / Engagement Customers want personalisation but are wary of privacy violations June 16, 2022
Governance, Risk and Compliance Prepare for the evolution of cybersecurity strategy, roles and technology June 10, 2022
Big Data, Analytics & Intelligence PodChats for FutureCIO: Intelligently verifying digital identities June 7, 2022
Governance, Risk and Compliance PodChats for FutureCISO: CISO as security champion and partner to business June 7, 2022
Computer, Storage, Networks, Connectivity Appetite for private networks drives MEC spending June 6, 2022
Governance, Risk and Compliance Security risks rise alongside connectedness, says ABI Research June 3, 2022
Customer Experience / Engagement Consumer identity verification preference when shopping online May 31, 2022
Cloud, Virtualization, Operating Environments and Middleware Oracle ups the ante in cloud security-enhancing OCI offering May 31, 2022
Big Data, Analytics & Intelligence Banks to use generative AI for better risk management May 30, 2022
Cloud, Virtualization, Operating Environments and Middleware Businesses more at risk after hybrid work and cloud admit CISOs May 18, 2022
Cloud, Virtualization, Operating Environments and Middleware Cloud migration and the rise of non-human identities May 10, 2022
Cloud, Virtualization, Operating Environments and Middleware Canalys names top three threats driving cloud spending in Q1 2022 May 6, 2022
Governance, Risk and Compliance Realistic cyber wargaming to up SG’s cyber response capability May 3, 2022
Governance, Risk and Compliance Phishing-as-a-Service presents a real and present danger April 22, 2022
Computer, Storage, Networks, Connectivity Consolidation, convergence and 5G compatibility to define SASE future April 21, 2022
Big Data, Analytics & Intelligence Sophisticated ransomware – the answer lies beyond the perimeter April 14, 2022
Governance, Risk and Compliance Board thinks security pros exaggerate threats and issues April 12, 2022
Governance, Risk and Compliance PodChats for FutureCISO: Futureproofing your Enterprise Incident Response in 2022 April 12, 2022
Cloud, Virtualization, Operating Environments and Middleware Looming cyber threats from the Russia-Ukraine war March 30, 2022
Governance, Risk and Compliance PodChats for FutureCISO: CISO in the crosshairs of security and privacy March 30, 2022
Business Applications & Databases 97% of IT systems in APAC can scam from legit messages March 30, 2022
Big Data, Analytics & Intelligence Surveillance tech open new opportunities for innovation March 29, 2022
Cloud, Virtualization, Operating Environments and Middleware Fewer IT leaders know where their data resides March 28, 2022
Big Data, Analytics & Intelligence PodChats for FutureCISO: How to get senior management buy-in March 22, 2022
Cloud, Virtualization, Operating Environments and Middleware How cloud DR supports business resilience March 17, 2022
Computer, Storage, Networks, Connectivity PodChats for FutureCIO: Addressing data protection gaps in 2022 March 16, 2022
Governance, Risk and Compliance Gartner outlines seven security and risk trends for 2022 March 10, 2022
Cloud, Virtualization, Operating Environments and Middleware Manufacturers bear brunt of cyberattacks in 2021 March 2, 2022
Governance, Risk and Compliance Employees’ tech habits present danger to APAC businesses February 25, 2022
Big Data, Analytics & Intelligence PodChats for FutureCIO: Why patch management matters in 2022 February 14, 2022
Big Data, Analytics & Intelligence Covid-induces fraud surge drives analytic innovation across industries February 14, 2022
Governance, Risk and Compliance Tight integration may be the route to better security posture February 11, 2022
Governance, Risk and Compliance Government should do more to protect against cyber risks February 10, 2022
Governance, Risk and Compliance 2021’s security vulnerabilities may predict what’s coming in 2022 February 10, 2022
Governance, Risk and Compliance Advanced remediation to minimise vulnerability risks February 4, 2022
Cloud, Virtualization, Operating Environments and Middleware SG firms comfortable with multi-cloud use February 1, 2022
Finance & Insurance PodChats for FutureCIO: Combating fraud risks in financial services in 2022 January 31, 2022
Governance, Risk and Compliance Phishing threats masking under Omicron label are rising fast January 27, 2022
Big Data, Analytics & Intelligence PodChats for FutureCIO: Making better decisions with data January 17, 2022
Computer, Storage, Networks, Connectivity PodChats for FutureCIO: Where XDR fits in data protection strategies January 12, 2022
Cloud, Virtualization, Operating Environments and Middleware Up in the clouds, rooted on-premise January 11, 2022
Cloud, Virtualization, Operating Environments and Middleware Commvault Intelligent Data Services January 10, 2022
Cloud, Virtualization, Operating Environments and Middleware Data management saves time and cost January 10, 2022
Cloud, Virtualization, Operating Environments and Middleware Data protection for hybrid cloud, containers and virtual machines January 10, 2022
Government and Public Services Legacy healthtech exposes the healthcare industry to serious cyber threats January 10, 2022
Big Data, Analytics & Intelligence PodChats for FutureCIO: Best practices to ensure AI fairness January 10, 2022
Governance, Risk and Compliance Third-party risk management strategies: See risk, solve problems, report results December 29, 2021
Business Applications & Databases The impact of enterprise-class domain registrar on your overall security rating December 29, 2021
Governance, Risk and Compliance Complete guide to building your third-party risk management December 29, 2021
Business Applications & Databases FutureCISO Security Alert: Understanding Log4J vulnerabilities December 24, 2021
Governance, Risk and Compliance PodChats for FutureCIO: Bracing for ransomware in 2022 December 24, 2021
Computer, Storage, Networks, Connectivity Why security as a service makes business sense December 23, 2021
Computer, Storage, Networks, Connectivity Barracuda shares security predictions for 2022 December 22, 2021
Big Data, Analytics & Intelligence Digitalization will help oil & gas firms cope with volatile times December 21, 2021
Governance, Risk and Compliance Barracuda checklists for defending against ransomware December 21, 2021
Governance, Risk and Compliance Don’t pay the ransom: A three-step guide to ransomware protection December 21, 2021
Business Applications & Databases FutureCISO Security Alert: Worst cyber security vulnerability December 20, 2021
Big Data, Analytics & Intelligence The many roads to business transformation in 2022 December 20, 2021
Governance, Risk and Compliance PodChats for FutureCIO: Learnings from Singapore’s cyber readiness December 20, 2021
Infrastructure & Platforms FutureCISO Alert: critical infrastructure on short notice December 10, 2021
Governance, Risk and Compliance Palo Alto Networks’ 5 cybersecurity predictions for APAC in 2022 December 10, 2021
Computer, Storage, Networks, Connectivity Three considerations when upgrading network monitoring system December 8, 2021
Computer, Storage, Networks, Connectivity PodChats for FutureCIO: Remote work's impact on security and network performance December 7, 2021
Computer, Storage, Networks, Connectivity Over-rotating cybersecurity leaves gaps in DR plans December 2, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: Securing the cloud of a data-driven enterprise November 30, 2021
Governance, Risk and Compliance More destructive broader-based cyberattacks in 2022 November 29, 2021
Big Data, Analytics & Intelligence PodChats for FutureCIO: Backup and recovery in the era of hybrid IT November 29, 2021
Governance, Risk and Compliance Ransomware and phishing trends & how to mitigate them November 26, 2021
Governance, Risk and Compliance Designing blockchain smart contract security and access control November 22, 2021
Big Data, Analytics & Intelligence From protection to prevention: Insurance’s new era November 22, 2021
Governance, Risk and Compliance 3 steps for SROs to lead from an offensive position November 19, 2021
Governance, Risk and Compliance Cyberattacks more successful on holidays and weekends November 18, 2021
Cloud, Virtualization, Operating Environments and Middleware PKI drivers, restraints, opportunities, and challenges in 2022 November 12, 2021
Cloud, Virtualization, Operating Environments and Middleware 83% of businesses don’t encrypt their data in the cloud November 10, 2021
Computer, Storage, Networks, Connectivity PodChats for FutureCIO: CISO tactics to enhance cyber threat readiness November 8, 2021
Management Leadership PodChats for FutureCIO: Integrating zero trust into existing security architectures November 5, 2021
Computer, Storage, Networks, Connectivity New uses for AI-capable robots in the data centre November 3, 2021
Big Data, Analytics & Intelligence Software engineering shortage leading to a price war November 2, 2021
Governance, Risk and Compliance Integrating NIST’s 5 best practices in cyber threat mitigation October 28, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: ICT trends in 2022 October 26, 2021
Governance, Risk and Compliance Aggressive cyber threats fuel demand for XDR solutions October 22, 2021
Big Data, Analytics & Intelligence In 2022, CIOs must find force multipliers to enable growth and innovation October 21, 2021
Governance, Risk and Compliance HK businesses notch up their cyber security readiness October 13, 2021
Governance, Risk and Compliance Cyber threats fuel vulnerability management market, says Frost October 11, 2021
Governance, Risk and Compliance Prevention is the best approach to ransomware protection October 7, 2021
Customer Experience / Engagement Security and compliance: top areas for trust perception October 4, 2021
Cloud, Virtualization, Operating Environments and Middleware Security remains in the cloudification of IT infrastructure September 30, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: Understanding the 5 3s of multi-cloud Strategies September 29, 2021
Business Applications & Databases Juniper Research warns robocall fraud to costs consumers $40 billion September 28, 2021
Governance, Risk and Compliance Cloud-native architecture prove resilient against cyber attacks September 24, 2021
HR, education and Training Remote security is still a big issue for users and employers September 23, 2021
Governance, Risk and Compliance FutureCISO Security Alert: UN hacking a case of basic security hygiene ignored? September 20, 2021
Business Applications & Databases FutureCISO Security Alert: 26 common on-prem databases vulnerability September 20, 2021
Governance, Risk and Compliance FutureCISO Security Alert: automated bot attacks unleashed September 17, 2021
Governance, Risk and Compliance Patch management and password policies can cut cyber risks by 60% September 16, 2021
Governance, Risk and Compliance IDC lists four drivers of security spending in APAC September 8, 2021
Big Data, Analytics & Intelligence IT at the core of government COVID recovery strategies September 7, 2021
Governance, Risk and Compliance More APAC businesses uncertain over cybersecurity defences in 2021 September 6, 2021
Governance, Risk and Compliance PodChats for FutureCIO: Top challenges for CISOs in Asia September 5, 2021
Governance, Risk and Compliance Accelerated DevOps drawing DDOS attacks, observed Imperva September 4, 2021
HR, education and Training Opportunities and challenges securing the hybrid workplace September 3, 2021
Governance, Risk and Compliance Why you need a prevention-first approach to cybersecurity September 3, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: Cloud considerations for capital market firms in Asia August 31, 2021
Computer, Storage, Networks, Connectivity Ransomware strategies in 2021 – new playbook required August 30, 2021
Infrastructure & Platforms Critical infrastructure is extremely vulnerable to simple attacks August 30, 2021
Corporate Social Responsibility Video surveillance is booming thanks to turmoil and pandemic August 23, 2021
Cloud, Virtualization, Operating Environments and Middleware How UES protects against shifting environments August 23, 2021
Governance, Risk and Compliance FutureCISO Security Alert: Application vulnerabilities are fodder to ransomware attacks August 16, 2021
Customer Experience / Engagement Singaporean consumers prefer being treated as individuals August 16, 2021
Computer, Storage, Networks, Connectivity PodChats for FutureCIO: Weaponization of Operational Technology August 10, 2021
Governance, Risk and Compliance Staying a few steps ahead of intensifying security challenges August 9, 2021
Security Enterprises want smart, seamless protection across the expanding attack surface August 7, 2021
Cloud, Virtualization, Operating Environments and Middleware Four trends are shaping the future of public cloud August 6, 2021
Computer, Storage, Networks, Connectivity SASE: It’s not new, but it’s “best of breed” August 4, 2021
Governance, Risk and Compliance Connecting the dots: Cyberattacks on SEA telcos linked to espionage August 4, 2021
Governance, Risk and Compliance FutureCISO Security Alert: Cyberattacks aimed at everyone in the enterprise August 3, 2021
Big Data, Analytics & Intelligence Comprehensive security strategy needed to reduce risk July 27, 2021
Governance, Risk and Compliance Cloud accelerates identity authentication access market July 26, 2021
Infrastructure & Platforms FutureCISO Security Alert: Cyber attackers are weaponizing OT to harm us July 23, 2021
Big Data, Analytics & Intelligence MAS outlines data governance for public cloud environments July 16, 2021
Big Data, Analytics & Intelligence ATxSG to address the intersection of tech, society & the digital economy July 9, 2021
Cloud, Virtualization, Operating Environments and Middleware FutureCISO Security Alert: $70 million to stop the attack on Kaseya July 7, 2021
Cloud, Virtualization, Operating Environments and Middleware 7 reasons to achieving hyperscale network security July 2, 2021
Cloud, Virtualization, Operating Environments and Middleware Making the jump to hyperscale network security July 2, 2021
Big Data, Analytics & Intelligence FutureCISO Security Alert: A malware by any other name June 28, 2021
Customer Experience / Engagement Remote onboarding to fuel digital identity verification market June 24, 2021
Big Data, Analytics & Intelligence PodChats for FutureCIO: Securing the enterprise from the Internet of Threats June 23, 2021
Governance, Risk and Compliance FutureCISO Security Alert: Unauthorised access accounts for 43% of all breaches globally June 21, 2021
Governance, Risk and Compliance 17 years later, enterprises still struggle to secure BYOD June 21, 2021
Infrastructure & Platforms Palo Alto Networks claims to make it easier to achieve zero trust June 18, 2021
Big Data, Analytics & Intelligence Digital reliance leaves lingering security side effects June 17, 2021
Business Applications & Databases PodChats for FutureCIO: How UCC must evolve to meet the new way of working June 15, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: getting to passwordless authentication June 8, 2021
Computer, Storage, Networks, Connectivity A How-to-Guide for modern enterprise data protection June 7, 2021
Governance, Risk and Compliance PodChats for FutureCIO: The winning combination in privacy and resilience June 1, 2021
Infrastructure & Platforms PodChats for FutureCIO: Closing the holes in data protection strategies May 31, 2021
Big Data, Analytics & Intelligence Right data and meaningful AI is critical to cybersecurity May 24, 2021
Computer, Storage, Networks, Connectivity The State of SD-WAN, SASE and Zero Trust Security Architectures May 23, 2021
Operations IDC MarketScape: Worldwide Unified Endpoint Management Software 2021 Vendor Assessment May 23, 2021
Cloud, Virtualization, Operating Environments and Middleware Zero trust is gaining traction among APAC businesses after COVID-19 May 20, 2021
Governance, Risk and Compliance FutureCISO Security Alert: The consequence of wilful ignorance of cyber risks May 19, 2021
Government and Public Services PodChats for FutureCIO: Containing the cyber contagion in ASEAN healthcare May 19, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: The future of cloud security services in Asia-Pacific May 14, 2021
Cloud, Virtualization, Operating Environments and Middleware IBM to simplify zero trust deployment with Cloud Pack for Security May 7, 2021
Infrastructure & Platforms Architecting and managing the IT needs of a hybrid workforce April 30, 2021
Cloud, Virtualization, Operating Environments and Middleware Where cloud-centric organisations should prioritise their data protection April 30, 2021
Cloud, Virtualization, Operating Environments and Middleware CrowdStrike expands end-to-end security through partner integration April 29, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: Managing hybrid IT in 2021 April 27, 2021
Cloud, Virtualization, Operating Environments and Middleware Emerging tech to drive end-user public cloud spending April 23, 2021
Cloud, Virtualization, Operating Environments and Middleware SaaS-based cyber threat intelligence to get crowded April 21, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: Securing the hybrid IT environment April 20, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: Cybersecurity challenges faced by CSPs April 19, 2021
Business Applications & Databases FutureCISO Security alert: Check your apps for vulnerable opensource parts April 17, 2021
Governance, Risk and Compliance FutureCISO Security alert: Users are getting good at detecting intrusions April 16, 2021
Computer, Storage, Networks, Connectivity Aruba ESP gets upgrade for edge-to-cloud security April 15, 2021
Infrastructure & Platforms FutureCIO Security alert: new zero-day exploit in Desktop Window Manager April 15, 2021
Governance, Risk and Compliance 6 reasons to automate PKI to increase productivity in 2021 April 14, 2021
Cloud, Virtualization, Operating Environments and Middleware Canalys warns cybersecurity is a reality for all April 13, 2021
Governance, Risk and Compliance Digital identity: the broken foundation of a thriving global online economy April 8, 2021
Government and Public Services Convergence to fuel cybersecurity spending in commercial and public sectors April 6, 2021
Computer, Storage, Networks, Connectivity Microsoft Vulnerabilities Report 2021 – how to address the dangers of Admin Rights April 5, 2021
Governance, Risk and Compliance Gartner’s takeaways for security & risk management for APAC in 2021 April 5, 2021
Governance, Risk and Compliance Systemic security issues that hinder successful transformation April 2, 2021
Cloud, Virtualization, Operating Environments and Middleware Enterprises must overcome the complexity of connectedness at scale April 1, 2021
Infrastructure & Platforms Critical information infrastructure – ignore at your own peril March 31, 2021
Governance, Risk and Compliance Gartner’s top security and risk management trends for 2021 March 29, 2021
Big Data, Analytics & Intelligence PodChats for FutureCIO: Protecting your dynamic workforce with cyber AI March 17, 2021
Business Applications & Databases Strong appetite for public cloud in APAC to remain until 2024 March 10, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: Cybersecurity with software and cloud-first strategies in 2021 March 4, 2021
Big Data, Analytics & Intelligence PodChats for FutureCIO: Fixing the top 3 security mistakes CIOs make March 3, 2021
Cloud, Virtualization, Operating Environments and Middleware Malaysia hinges its digital future on MyDIGITAL March 2, 2021
Big Data, Analytics & Intelligence PodChats for FutureCIO: Data trends in the smart normal in 2021 March 2, 2021
Business Applications & Databases PodChats for FutureCIO: Addressing enterprise app vulnerabilities in the cloud March 1, 2021
Big Data, Analytics & Intelligence Recovery and growth to drive Govt IT spending in 2021 February 24, 2021
Computer, Storage, Networks, Connectivity 8 ways to stop Sunburst and other supply chain attacks February 22, 2021
Computer, Storage, Networks, Connectivity PodChats for FutureCIO: The evolving cybersecurity landscape among ASEAN FSIs February 16, 2021
Computer, Storage, Networks, Connectivity Critical infrastructure to surpass US$105 billion in 2021 February 15, 2021
Computer, Storage, Networks, Connectivity SPH modernises wireless infrastructure to meet its digital goals February 10, 2021
Business Applications & Databases PodChats for FutureCIO: Financial crime from the perspective of the CIO February 9, 2021
Cloud, Virtualization, Operating Environments and Middleware What will 2021 bring for IT and IT people? February 3, 2021
Cloud, Virtualization, Operating Environments and Middleware Gartner tips to capture the Privileged Access Management market January 26, 2021
Cloud, Virtualization, Operating Environments and Middleware Beware those spikes in your cloud bills January 25, 2021