Big Data, Analytics & Intelligence Tackling API security challenges through AI/ML solutions September 4, 2024
Technology Tech trends highlighted in Gartner 2024 Hype Cycle for Emerging Technologies August 28, 2024
Technology 98% of Hong Kong organisations had two or more identity-related breaches in the past year, report finds July 22, 2024
Technology Only 3% of companies in Singapore & Malaysia could restore business processes within 24 hours after a cyberattack July 19, 2024
FutureCISO Cybercriminals are exploiting new industry vulnerabilities 43% faster, study finds July 12, 2024
FutureCISO FinVolution invests in deepfake detection tech to fight deepfake and financial crimes July 8, 2024
Technology Philippine Airlines partners with ViewQwest to elevate network and security infrastructure July 4, 2024
FutureCISO Security professionals call for extra security measures amidst data leak on food giant June 28, 2024
Infrastructure & Platforms CyberArk extends Identity Security Platform with new security capabilities June 24, 2024
FutureCISO Study finds cybercriminals exploiting new industry vulnerabilities 43% faster June 17, 2024
Infrastructure & Platforms Indonesian government launches INA Digital to integrate existing mobile apps June 12, 2024
FutureCISO 89% of geo-distributed businesses in APAC using container development faced cyberattacks June 10, 2024
Security Healthcare organisations lose 20% of their sensitive data in every ransomware attack May 14, 2024
Technology Ransomware protection is, top priority for public sector IT infrastructure investment May 8, 2024
Security Sophos and Tenable to launch new vulnerability and attack surface management service April 12, 2024
Technology Singtel collaborates with Cisco, Fortinet, and Nokia to build quantum-safe solutions April 10, 2024
Security ‘Information Hyperinflation’ challenge privacy and security of Australian enterprises March 21, 2024
Big Data, Analytics & Intelligence From AI to generative AI in financial services: Cutting through the hype March 21, 2024
Technology Alarming rise of codebases containing high-risk open-source vulnerabilities logged March 13, 2024
Cloud, Virtualization, Operating Environments and Middleware Google Cloud publishes latest Threat Horizons Report March 8, 2024
White Papers Cybernomics 101 - Uncovering the financial forces driving cyberattacks February 28, 2024
Technology IBM and NCS partner for quantum-safe readiness for enterprises in Singapore February 14, 2024
Security Deepfakes to render identity verification and authentication solutions inefficient February 8, 2024
Management Leadership Cybersecurity consultancies face high expectations from APAC CISOs January 9, 2024
Technology Network segmentation, extremely important amid rising ransomware attacks November 28, 2023
Technology SG orgs’ cyber threats caused by outdated cybersecurity programs, study finds November 10, 2023
Technology Consumers overwhelmed with signing up for online services, reports Affindi November 6, 2023
Technology Boomers have better cybersecurity habits than Millennials and Gen Z, study finds November 1, 2023
Technology Keeper Security provides cryptographic digital signature for heightened software security October 26, 2023
Technology Dow Jones Risk & Compliance launches RiskCenter Advanced Screening and Monitoring September 27, 2023
Technology HGC’s new service to help enterprises operating across Greater Bay Area September 26, 2023
Technology 85% of organisations suffered from at least one ransomware attack, study finds September 26, 2023
Government and Public Services PodChat for FutureCIO: Hurdles to the digitalisation of healthcare September 15, 2023
Technology Only 18% of Hong Kongers feel equipped to handle cyber threats, Norton study finds September 8, 2023
Governance, Risk and Compliance No excuse for unpreparedness as ransomware continues to plague APAC August 25, 2023
White Papers The Essential Eight: Implementing the Australian cyber security centre's essential eight recommendations August 16, 2023
Security Identity security risks: Analysing danger zones in interconnected environments August 1, 2023
Cloud, Virtualization, Operating Environments and Middleware Splunk, Microsoft forge strategic partnership August 1, 2023
Governance, Risk and Compliance Digitalisation boosts evidence management in law enforcement July 21, 2023
Business Applications & Databases Use platform engineering to scale app security practices July 10, 2023
Governance, Risk and Compliance SG risk professionals expect financial crime to rise in 2023/2024 July 4, 2023
HR, education and Training PodChats for FutureCIO: Picking up the data after staff turnover July 3, 2023
Cloud, Virtualization, Operating Environments and Middleware Standard Foods deploys Nutanix’s HCI technology June 22, 2023
Big Data, Analytics & Intelligence ExecOpinion: Maximising the value of the cloud computing June 21, 2023
Computer, Storage, Networks, Connectivity PodChats for FutureCIO: Modernising network management for the hybrid enterprise June 20, 2023
Big Data, Analytics & Intelligence Six ChatGPT Risks legal and compliance leaders must evaluate May 24, 2023
Business Applications & Databases GitHub delivers private vulnerability reporting at scale April 25, 2023
Cloud, Virtualization, Operating Environments and Middleware Akamai fortifies API security with Neosec acquisition April 21, 2023
Governance, Risk and Compliance Architecting for meaningful data sovereignty strategies March 17, 2023
Security Security budgets undeterred by prevailing economic volatility and uncertainty March 15, 2023
HR, education and Training ExecOpinion: Strategies for women building a cybersecurity career February 28, 2023
Management Leadership PodChats for FutureCISO: Narrowing the cybersecurity gender leadership gap February 8, 2023
Cloud, Virtualization, Operating Environments and Middleware The Game Plan: Strategies for moving beyond patchwork IT January 31, 2023
Cloud, Virtualization, Operating Environments and Middleware How hybrid cloud can improve performance and data regulation January 4, 2023
Big Data, Analytics & Intelligence Investment priorities for APAC businesses in 2023 December 19, 2022
Computer, Storage, Networks, Connectivity Unregistered devices give HK firms a cybersecurity headache December 2, 2022
Cloud, Virtualization, Operating Environments and Middleware 98% of firms use cloud in data protection strategy December 1, 2022
Cloud, Virtualization, Operating Environments and Middleware Ten common cloud strategy mistakes November 24, 2022
White Papers Why immutable data storage is an integral part of a CISO’s IT security strategy November 14, 2022
Government and Public Services Government digitisation to fuel mobile identity growth October 28, 2022
Business Applications & Databases PodChats for FutureCIO: Futureproofing the enterprise’s modernisation journey October 25, 2022
Management Leadership Time to reimagine assumptions and turn uncertainty into certainty October 21, 2022
Governance, Risk and Compliance Reigning in social engineering scams with "Dynamic Interventions" October 18, 2022
Security APAC’s critical infrastructure and growing financial sector to drive cybersecurity spending October 6, 2022
Governance, Risk and Compliance Metaverse increase trust risks for enterprises and users September 23, 2022
Big Data, Analytics & Intelligence PodChats for FutureCIO: Future-proofing your modernisation journey with AI September 19, 2022
Security PodChats for FutureCISO: Improve cyber risk outcomes in distributed ecosystems September 12, 2022
Business Applications & Databases PodChats for FutureCIO: Addressing application vulnerability in the cloud era September 8, 2022
Governance, Risk and Compliance Are we kicking the can down the road with ransomware payments? September 1, 2022
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCISO: Futureproofing network security August 19, 2022
Security Study points to the prevalence of software supply chains in cloud-native apps August 18, 2022
Governance, Risk and Compliance CIAM is the simplest solution to reduce friction for user access June 30, 2022
Computer, Storage, Networks, Connectivity Security and ESG concerns affect data centre growth June 30, 2022