Governance, Risk and Compliance Half of zero trust adopters will fail to realise its benefits June 22, 2022
Customer Experience / Engagement Customers want personalisation but are wary of privacy violations June 16, 2022
Governance, Risk and Compliance Prepare for the evolution of cybersecurity strategy, roles and technology June 10, 2022
Big Data, Analytics & Intelligence PodChats for FutureCIO: Intelligently verifying digital identities June 7, 2022
Governance, Risk and Compliance PodChats for FutureCISO: CISO as security champion and partner to business June 7, 2022
Computer, Storage, Networks, Connectivity Appetite for private networks drives MEC spending June 6, 2022
Governance, Risk and Compliance Security risks rise alongside connectedness, says ABI Research June 3, 2022
Customer Experience / Engagement Consumer identity verification preference when shopping online May 31, 2022
Cloud, Virtualization, Operating Environments and Middleware Oracle ups the ante in cloud security-enhancing OCI offering May 31, 2022
Big Data, Analytics & Intelligence Banks to use generative AI for better risk management May 30, 2022
Cloud, Virtualization, Operating Environments and Middleware Businesses more at risk after hybrid work and cloud admit CISOs May 18, 2022
Cloud, Virtualization, Operating Environments and Middleware Cloud migration and the rise of non-human identities May 10, 2022
Cloud, Virtualization, Operating Environments and Middleware Canalys names top three threats driving cloud spending in Q1 2022 May 6, 2022
Governance, Risk and Compliance Realistic cyber wargaming to up SG’s cyber response capability May 3, 2022
Governance, Risk and Compliance Phishing-as-a-Service presents a real and present danger April 22, 2022
Computer, Storage, Networks, Connectivity Consolidation, convergence and 5G compatibility to define SASE future April 21, 2022
Big Data, Analytics & Intelligence Sophisticated ransomware – the answer lies beyond the perimeter April 14, 2022
Governance, Risk and Compliance Board thinks security pros exaggerate threats and issues April 12, 2022
Governance, Risk and Compliance PodChats for FutureCISO: Futureproofing your Enterprise Incident Response in 2022 April 12, 2022
Cloud, Virtualization, Operating Environments and Middleware Looming cyber threats from the Russia-Ukraine war March 30, 2022
Governance, Risk and Compliance PodChats for FutureCISO: CISO in the crosshairs of security and privacy March 30, 2022
Business Applications & Databases 97% of IT systems in APAC can scam from legit messages March 30, 2022
Big Data, Analytics & Intelligence Surveillance tech open new opportunities for innovation March 29, 2022
Cloud, Virtualization, Operating Environments and Middleware Fewer IT leaders know where their data resides March 28, 2022
Big Data, Analytics & Intelligence PodChats for FutureCISO: How to get senior management buy-in March 22, 2022
Cloud, Virtualization, Operating Environments and Middleware How cloud DR supports business resilience March 17, 2022
Computer, Storage, Networks, Connectivity PodChats for FutureCIO: Addressing data protection gaps in 2022 March 16, 2022
Governance, Risk and Compliance Gartner outlines seven security and risk trends for 2022 March 10, 2022
Cloud, Virtualization, Operating Environments and Middleware Manufacturers bear brunt of cyberattacks in 2021 March 2, 2022
Governance, Risk and Compliance Employees’ tech habits present danger to APAC businesses February 25, 2022
Big Data, Analytics & Intelligence PodChats for FutureCIO: Why patch management matters in 2022 February 14, 2022
Big Data, Analytics & Intelligence Covid-induces fraud surge drives analytic innovation across industries February 14, 2022
Governance, Risk and Compliance Tight integration may be the route to better security posture February 11, 2022
Governance, Risk and Compliance Government should do more to protect against cyber risks February 10, 2022
Governance, Risk and Compliance 2021’s security vulnerabilities may predict what’s coming in 2022 February 10, 2022
Governance, Risk and Compliance Advanced remediation to minimise vulnerability risks February 4, 2022
Cloud, Virtualization, Operating Environments and Middleware SG firms comfortable with multi-cloud use February 1, 2022
Finance & Insurance PodChats for FutureCIO: Combating fraud risks in financial services in 2022 January 31, 2022
Governance, Risk and Compliance Phishing threats masking under Omicron label are rising fast January 27, 2022
Big Data, Analytics & Intelligence PodChats for FutureCIO: Making better decisions with data January 17, 2022
Computer, Storage, Networks, Connectivity PodChats for FutureCIO: Where XDR fits in data protection strategies January 12, 2022
Cloud, Virtualization, Operating Environments and Middleware Up in the clouds, rooted on-premise January 11, 2022
Cloud, Virtualization, Operating Environments and Middleware Commvault Intelligent Data Services January 10, 2022
Cloud, Virtualization, Operating Environments and Middleware Data management saves time and cost January 10, 2022
Cloud, Virtualization, Operating Environments and Middleware Data protection for hybrid cloud, containers and virtual machines January 10, 2022
Government and Public Services Legacy healthtech exposes the healthcare industry to serious cyber threats January 10, 2022
Big Data, Analytics & Intelligence PodChats for FutureCIO: Best practices to ensure AI fairness January 10, 2022
Governance, Risk and Compliance Third-party risk management strategies: See risk, solve problems, report results December 29, 2021
Business Applications & Databases The impact of enterprise-class domain registrar on your overall security rating December 29, 2021
Governance, Risk and Compliance Complete guide to building your third-party risk management December 29, 2021
Business Applications & Databases FutureCISO Security Alert: Understanding Log4J vulnerabilities December 24, 2021
Governance, Risk and Compliance PodChats for FutureCIO: Bracing for ransomware in 2022 December 24, 2021
Computer, Storage, Networks, Connectivity Why security as a service makes business sense December 23, 2021
Computer, Storage, Networks, Connectivity Barracuda shares security predictions for 2022 December 22, 2021
Big Data, Analytics & Intelligence Digitalization will help oil & gas firms cope with volatile times December 21, 2021
Governance, Risk and Compliance Barracuda checklists for defending against ransomware December 21, 2021
Governance, Risk and Compliance Don’t pay the ransom: A three-step guide to ransomware protection December 21, 2021
Business Applications & Databases FutureCISO Security Alert: Worst cyber security vulnerability December 20, 2021
Big Data, Analytics & Intelligence The many roads to business transformation in 2022 December 20, 2021
Governance, Risk and Compliance PodChats for FutureCIO: Learnings from Singapore’s cyber readiness December 20, 2021
Infrastructure & Platforms FutureCISO Alert: critical infrastructure on short notice December 10, 2021
Governance, Risk and Compliance Palo Alto Networks’ 5 cybersecurity predictions for APAC in 2022 December 10, 2021
Computer, Storage, Networks, Connectivity Three considerations when upgrading network monitoring system December 8, 2021
Computer, Storage, Networks, Connectivity PodChats for FutureCIO: Remote work's impact on security and network performance December 7, 2021
Computer, Storage, Networks, Connectivity Over-rotating cybersecurity leaves gaps in DR plans December 2, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: Securing the cloud of a data-driven enterprise November 30, 2021
Governance, Risk and Compliance More destructive broader-based cyberattacks in 2022 November 29, 2021
Big Data, Analytics & Intelligence PodChats for FutureCIO: Backup and recovery in the era of hybrid IT November 29, 2021
Governance, Risk and Compliance Ransomware and phishing trends & how to mitigate them November 26, 2021
Governance, Risk and Compliance Designing blockchain smart contract security and access control November 22, 2021
Big Data, Analytics & Intelligence From protection to prevention: Insurance’s new era November 22, 2021
Governance, Risk and Compliance 3 steps for SROs to lead from an offensive position November 19, 2021
Governance, Risk and Compliance Cyberattacks more successful on holidays and weekends November 18, 2021
Cloud, Virtualization, Operating Environments and Middleware PKI drivers, restraints, opportunities, and challenges in 2022 November 12, 2021
Cloud, Virtualization, Operating Environments and Middleware 83% of businesses don’t encrypt their data in the cloud November 10, 2021
Computer, Storage, Networks, Connectivity PodChats for FutureCIO: CISO tactics to enhance cyber threat readiness November 8, 2021
Management Leadership PodChats for FutureCIO: Integrating zero trust into existing security architectures November 5, 2021
Computer, Storage, Networks, Connectivity New uses for AI-capable robots in the data centre November 3, 2021
Big Data, Analytics & Intelligence Software engineering shortage leading to a price war November 2, 2021
Governance, Risk and Compliance Integrating NIST’s 5 best practices in cyber threat mitigation October 28, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: ICT trends in 2022 October 26, 2021
Governance, Risk and Compliance Aggressive cyber threats fuel demand for XDR solutions October 22, 2021
Big Data, Analytics & Intelligence In 2022, CIOs must find force multipliers to enable growth and innovation October 21, 2021
Governance, Risk and Compliance HK businesses notch up their cyber security readiness October 13, 2021
Governance, Risk and Compliance Cyber threats fuel vulnerability management market, says Frost October 11, 2021
Governance, Risk and Compliance Prevention is the best approach to ransomware protection October 7, 2021
Customer Experience / Engagement Security and compliance: top areas for trust perception October 4, 2021
Cloud, Virtualization, Operating Environments and Middleware Security remains in the cloudification of IT infrastructure September 30, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: Understanding the 5 3s of multi-cloud Strategies September 29, 2021
Business Applications & Databases Juniper Research warns robocall fraud to costs consumers $40 billion September 28, 2021
Governance, Risk and Compliance Cloud-native architecture prove resilient against cyber attacks September 24, 2021
HR, education and Training Remote security is still a big issue for users and employers September 23, 2021
Governance, Risk and Compliance FutureCISO Security Alert: UN hacking a case of basic security hygiene ignored? September 20, 2021
Business Applications & Databases FutureCISO Security Alert: 26 common on-prem databases vulnerability September 20, 2021
Governance, Risk and Compliance FutureCISO Security Alert: automated bot attacks unleashed September 17, 2021
Governance, Risk and Compliance Patch management and password policies can cut cyber risks by 60% September 16, 2021
Governance, Risk and Compliance IDC lists four drivers of security spending in APAC September 8, 2021
Big Data, Analytics & Intelligence IT at the core of government COVID recovery strategies September 7, 2021
Governance, Risk and Compliance More APAC businesses uncertain over cybersecurity defences in 2021 September 6, 2021
Governance, Risk and Compliance PodChats for FutureCIO: Top challenges for CISOs in Asia September 5, 2021
Governance, Risk and Compliance Accelerated DevOps drawing DDOS attacks, observed Imperva September 4, 2021
HR, education and Training Opportunities and challenges securing the hybrid workplace September 3, 2021
Governance, Risk and Compliance Why you need a prevention-first approach to cybersecurity September 3, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: Cloud considerations for capital market firms in Asia August 31, 2021
Computer, Storage, Networks, Connectivity Ransomware strategies in 2021 – new playbook required August 30, 2021
Infrastructure & Platforms Critical infrastructure is extremely vulnerable to simple attacks August 30, 2021
Corporate Social Responsibility Video surveillance is booming thanks to turmoil and pandemic August 23, 2021
Cloud, Virtualization, Operating Environments and Middleware How UES protects against shifting environments August 23, 2021
Governance, Risk and Compliance FutureCISO Security Alert: Application vulnerabilities are fodder to ransomware attacks August 16, 2021
Customer Experience / Engagement Singaporean consumers prefer being treated as individuals August 16, 2021
Computer, Storage, Networks, Connectivity PodChats for FutureCIO: Weaponization of Operational Technology August 10, 2021
Governance, Risk and Compliance Staying a few steps ahead of intensifying security challenges August 9, 2021
Security Enterprises want smart, seamless protection across the expanding attack surface August 7, 2021
Cloud, Virtualization, Operating Environments and Middleware Four trends are shaping the future of public cloud August 6, 2021
Computer, Storage, Networks, Connectivity SASE: It’s not new, but it’s “best of breed” August 4, 2021
Governance, Risk and Compliance Connecting the dots: Cyberattacks on SEA telcos linked to espionage August 4, 2021
Governance, Risk and Compliance FutureCISO Security Alert: Cyberattacks aimed at everyone in the enterprise August 3, 2021
Big Data, Analytics & Intelligence Comprehensive security strategy needed to reduce risk July 27, 2021
Governance, Risk and Compliance Cloud accelerates identity authentication access market July 26, 2021
Infrastructure & Platforms FutureCISO Security Alert: Cyber attackers are weaponizing OT to harm us July 23, 2021
Big Data, Analytics & Intelligence MAS outlines data governance for public cloud environments July 16, 2021
Big Data, Analytics & Intelligence ATxSG to address the intersection of tech, society & the digital economy July 9, 2021
Cloud, Virtualization, Operating Environments and Middleware FutureCISO Security Alert: $70 million to stop the attack on Kaseya July 7, 2021
Cloud, Virtualization, Operating Environments and Middleware 7 reasons to achieving hyperscale network security July 2, 2021
Cloud, Virtualization, Operating Environments and Middleware Making the jump to hyperscale network security July 2, 2021
Big Data, Analytics & Intelligence FutureCISO Security Alert: A malware by any other name June 28, 2021
Customer Experience / Engagement Remote onboarding to fuel digital identity verification market June 24, 2021
Big Data, Analytics & Intelligence PodChats for FutureCIO: Securing the enterprise from the Internet of Threats June 23, 2021
Governance, Risk and Compliance FutureCISO Security Alert: Unauthorised access accounts for 43% of all breaches globally June 21, 2021
Governance, Risk and Compliance 17 years later, enterprises still struggle to secure BYOD June 21, 2021
Infrastructure & Platforms Palo Alto Networks claims to make it easier to achieve zero trust June 18, 2021
Big Data, Analytics & Intelligence Digital reliance leaves lingering security side effects June 17, 2021
Business Applications & Databases PodChats for FutureCIO: How UCC must evolve to meet the new way of working June 15, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: getting to passwordless authentication June 8, 2021
Computer, Storage, Networks, Connectivity A How-to-Guide for modern enterprise data protection June 7, 2021
Governance, Risk and Compliance PodChats for FutureCIO: The winning combination in privacy and resilience June 1, 2021
Infrastructure & Platforms PodChats for FutureCIO: Closing the holes in data protection strategies May 31, 2021
Big Data, Analytics & Intelligence Right data and meaningful AI is critical to cybersecurity May 24, 2021
Computer, Storage, Networks, Connectivity The State of SD-WAN, SASE and Zero Trust Security Architectures May 23, 2021
Operations IDC MarketScape: Worldwide Unified Endpoint Management Software 2021 Vendor Assessment May 23, 2021
Cloud, Virtualization, Operating Environments and Middleware Zero trust is gaining traction among APAC businesses after COVID-19 May 20, 2021
Governance, Risk and Compliance FutureCISO Security Alert: The consequence of wilful ignorance of cyber risks May 19, 2021
Government and Public Services PodChats for FutureCIO: Containing the cyber contagion in ASEAN healthcare May 19, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: The future of cloud security services in Asia-Pacific May 14, 2021
Cloud, Virtualization, Operating Environments and Middleware IBM to simplify zero trust deployment with Cloud Pack for Security May 7, 2021
Infrastructure & Platforms Architecting and managing the IT needs of a hybrid workforce April 30, 2021
Cloud, Virtualization, Operating Environments and Middleware Where cloud-centric organisations should prioritise their data protection April 30, 2021
Cloud, Virtualization, Operating Environments and Middleware CrowdStrike expands end-to-end security through partner integration April 29, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: Managing hybrid IT in 2021 April 27, 2021
Cloud, Virtualization, Operating Environments and Middleware Emerging tech to drive end-user public cloud spending April 23, 2021
Cloud, Virtualization, Operating Environments and Middleware SaaS-based cyber threat intelligence to get crowded April 21, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: Securing the hybrid IT environment April 20, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: Cybersecurity challenges faced by CSPs April 19, 2021
Business Applications & Databases FutureCISO Security alert: Check your apps for vulnerable opensource parts April 17, 2021
Governance, Risk and Compliance FutureCISO Security alert: Users are getting good at detecting intrusions April 16, 2021
Computer, Storage, Networks, Connectivity Aruba ESP gets upgrade for edge-to-cloud security April 15, 2021
Infrastructure & Platforms FutureCIO Security alert: new zero-day exploit in Desktop Window Manager April 15, 2021
Governance, Risk and Compliance 6 reasons to automate PKI to increase productivity in 2021 April 14, 2021
Cloud, Virtualization, Operating Environments and Middleware Canalys warns cybersecurity is a reality for all April 13, 2021
Governance, Risk and Compliance Digital identity: the broken foundation of a thriving global online economy April 8, 2021
Government and Public Services Convergence to fuel cybersecurity spending in commercial and public sectors April 6, 2021
Computer, Storage, Networks, Connectivity Microsoft Vulnerabilities Report 2021 – how to address the dangers of Admin Rights April 5, 2021
Governance, Risk and Compliance Gartner’s takeaways for security & risk management for APAC in 2021 April 5, 2021
Governance, Risk and Compliance Systemic security issues that hinder successful transformation April 2, 2021
Cloud, Virtualization, Operating Environments and Middleware Enterprises must overcome the complexity of connectedness at scale April 1, 2021
Infrastructure & Platforms Critical information infrastructure – ignore at your own peril March 31, 2021
Governance, Risk and Compliance Gartner’s top security and risk management trends for 2021 March 29, 2021
Big Data, Analytics & Intelligence PodChats for FutureCIO: Protecting your dynamic workforce with cyber AI March 17, 2021
Business Applications & Databases Strong appetite for public cloud in APAC to remain until 2024 March 10, 2021
Cloud, Virtualization, Operating Environments and Middleware PodChats for FutureCIO: Cybersecurity with software and cloud-first strategies in 2021 March 4, 2021
Big Data, Analytics & Intelligence PodChats for FutureCIO: Fixing the top 3 security mistakes CIOs make March 3, 2021
Cloud, Virtualization, Operating Environments and Middleware Malaysia hinges its digital future on MyDIGITAL March 2, 2021
Big Data, Analytics & Intelligence PodChats for FutureCIO: Data trends in the smart normal in 2021 March 2, 2021
Business Applications & Databases PodChats for FutureCIO: Addressing enterprise app vulnerabilities in the cloud March 1, 2021
Big Data, Analytics & Intelligence Recovery and growth to drive Govt IT spending in 2021 February 24, 2021
Computer, Storage, Networks, Connectivity 8 ways to stop Sunburst and other supply chain attacks February 22, 2021
Computer, Storage, Networks, Connectivity PodChats for FutureCIO: The evolving cybersecurity landscape among ASEAN FSIs February 16, 2021
Computer, Storage, Networks, Connectivity Critical infrastructure to surpass US$105 billion in 2021 February 15, 2021
Computer, Storage, Networks, Connectivity SPH modernises wireless infrastructure to meet its digital goals February 10, 2021
Business Applications & Databases PodChats for FutureCIO: Financial crime from the perspective of the CIO February 9, 2021
Cloud, Virtualization, Operating Environments and Middleware What will 2021 bring for IT and IT people? February 3, 2021
Cloud, Virtualization, Operating Environments and Middleware Gartner tips to capture the Privileged Access Management market January 26, 2021
Cloud, Virtualization, Operating Environments and Middleware Beware those spikes in your cloud bills January 25, 2021
Computer, Storage, Networks, Connectivity Why data protection needs an urgent rethink January 22, 2021
Business Applications & Databases Cloud-based email and web security more popular in APAC January 21, 2021
Big Data, Analytics & Intelligence PodChats for FutureCIO: CTO as the driver of digital transformation January 19, 2021
Infrastructure & Platforms Security experts link SolarWinds attack with Kazuar backdoor January 14, 2021
Cloud, Virtualization, Operating Environments and Middleware Arcserve releases all-in-one data protection appliance January 12, 2021
Big Data, Analytics & Intelligence Prioritising Network Detection and Response in 2021 January 7, 2021
Computer, Storage, Networks, Connectivity JoongAng Group sees AI-powered network as key to its smart office strategy January 6, 2021
Finance & Insurance PodChats for FutureCIO: The operational risks of cyber threats to Asia’s financial sector December 29, 2020
Computer, Storage, Networks, Connectivity PodChats for FutureCIO: Securing the borderless enterprise in 2021 December 28, 2020
Big Data, Analytics & Intelligence AWS outlines 8 technologies that will change lives in 2021 December 22, 2020
Finance & Insurance Frost sees growth opportunities in the holistic web protection market December 22, 2020
Business Applications & Databases One Identity reveals barriers to Zero Trust Framework adoption December 18, 2020
Computer, Storage, Networks, Connectivity 2021 and the future of business connectivity December 10, 2020
Government and Public Services Govt and manufacturers top list of cyber-espionage victims in APAC December 10, 2020
Operations PodChats for FutureCIO: Addressing SG cybersecurity state in 2020 and beyond December 3, 2020
Cloud, Virtualization, Operating Environments and Middleware Podchats for FutureCIO: Securing the digital-native Enterprise December 1, 2020
Government and Public Services Defending in isolation inadequate for healthcare supply chain November 27, 2020
Business Applications & Databases Gartner ranks IT governance as the top risk for 2021 November 23, 2020
Cloud, Virtualization, Operating Environments and Middleware AI-powered service to remove excessive cloud permissions November 20, 2020
Finance & Insurance Ransomware attacks a rising threat to financial institutions says FS-ISAC November 20, 2020
Big Data, Analytics & Intelligence NUS develops tools for checking compromised AI systems November 19, 2020
Infrastructure & Platforms Missing skills, integration and security concerns hinder edge used in APAC November 12, 2020
Computer, Storage, Networks, Connectivity Building a strong foundation for the Intelligent Campus November 11, 2020
Business-IT Alignment Advocating for a digital-lead business recovery from COVID-19 November 10, 2020
Computer, Storage, Networks, Connectivity Claroty adds integrated remote incident management to OT security platform November 3, 2020
Customer Experience / Engagement The future of advertising lies in protecting user identities October 28, 2020
Customer Experience / Engagement Complexity and validation: the bane of Philippine lenders October 27, 2020
Business Applications & Databases PodChats for FutureCIO: Making a business case for DevSecOps October 19, 2020
Computer, Storage, Networks, Connectivity IT-OT convergence raises disparity around security October 16, 2020
Cloud, Virtualization, Operating Environments and Middleware Busting the 12 myths of cloud security October 13, 2020
Business Applications & Databases Plugging the insecurity hole in rapid application rollout October 1, 2020
Government and Public Services PPIS uses AI-powered prevention-first cybersecurity platform September 28, 2020
Finance & Insurance ZA Bank automates screening of banking transactions with Accuity September 18, 2020
Infrastructure & Platforms Managed security spending up in ANZ market despite COVID-19 September 16, 2020
Infrastructure & Platforms COVID-19 reveals gaping holes in cyber threat readiness September 15, 2020
Big Data, Analytics & Intelligence Podchats for FutureCIO: Simplifying the story of data management September 8, 2020
Management Leadership CEOs to become personally liable for cyber-physical security incidents September 8, 2020
Big Data, Analytics & Intelligence Data security issues fuel big data analytics growth September 7, 2020
Business Applications & Databases Digital banking innovation intensifies competition September 3, 2020
Cloud, Virtualization, Operating Environments and Middleware Cloud-native apps fuel growth of container management September 1, 2020
Computer, Storage, Networks, Connectivity PodChats for FutureCIO: How edge influences your customer engagement strategy August 31, 2020
Cloud, Virtualization, Operating Environments and Middleware Cloud gets business priority during COVID-19 August 28, 2020
Cloud, Virtualization, Operating Environments and Middleware Integrated cloud security: challenges to the APAC market August 28, 2020
Computer, Storage, Networks, Connectivity Build a security strategy aligned to resilient business directives August 27, 2020
Computer, Storage, Networks, Connectivity The risky business of buying fake enterprise devices August 18, 2020
Governance, Risk and Compliance CISO Alert: COVID-19 vaccine – a new playground for threat actors August 13, 2020
Big Data, Analytics & Intelligence Stay ahead of cybercriminals with predictive cyber-intelligence August 13, 2020
Computer, Storage, Networks, Connectivity PZTA to provide higher levels of security than VPNs August 5, 2020
Big Data, Analytics & Intelligence Coming in the future soon maybe: global healthcare interoperability August 3, 2020
Big Data, Analytics & Intelligence Video surveillance camera market despite COVID-19 and US-China spat July 20, 2020
Cloud, Virtualization, Operating Environments and Middleware Cybercriminals targeting cloud infrastructure July 10, 2020
Customer Experience / Engagement Digital banking attitudes among Malaysians and Filipinos July 1, 2020
Cloud, Virtualization, Operating Environments and Middleware AI-powered SOC: 7 tips as guidepost in adopting cybersecurity strategy June 19, 2020
Cloud, Virtualization, Operating Environments and Middleware HK businesses favour SD-WAN for its security edge June 17, 2020
Cloud, Virtualization, Operating Environments and Middleware MDR: managed security by any other name? June 16, 2020
Cloud, Virtualization, Operating Environments and Middleware Advanced cyber threats spur demand for managed and response solutions June 15, 2020
Business Applications & Databases Monetising applications with secure software supply chain June 2, 2020
Governance, Risk and Compliance When software security strategy boils down to issuing bug bounty June 1, 2020
HR, education and Training Mist Systems launches AI-assisted contact tracing for workplace May 29, 2020
Cloud, Virtualization, Operating Environments and Middleware Cloud-Native versus Edge-Native: know the difference May 22, 2020
Business Applications & Databases 91% of open source code in use today poses significant risks May 18, 2020
Governance, Risk and Compliance COVID-19 raises alarm over third-party cybersecurity risk May 4, 2020
Cloud, Virtualization, Operating Environments and Middleware Misconfigurations are the main culprit in cloud security April 27, 2020
Business Applications & Databases Rolling out a secure multi-experience outcome from the inside-out April 6, 2020
Governance, Risk and Compliance Threat actors partnering to increase chances of success March 31, 2020
Cloud, Virtualization, Operating Environments and Middleware An immune system approach for cloud security March 18, 2020
Big Data, Analytics & Intelligence AI-augmented attacks and the battle of the algorithms March 18, 2020
Infrastructure & Platforms Firewall and messaging security are top buys in APAC in 2019 March 10, 2020
Cloud, Virtualization, Operating Environments and Middleware Workplace challenges now and post COVID-19 February 27, 2020
Cloud, Virtualization, Operating Environments and Middleware The real hold up when it comes to public cloud February 24, 2020
Big Data, Analytics & Intelligence 2020 operational risks for C-suite consideration February 19, 2020
Cloud, Virtualization, Operating Environments and Middleware Gartner busts 2020’s top 10 cloud myths February 17, 2020
Cloud, Virtualization, Operating Environments and Middleware Check Point says new service will cut time security management spent by 60% February 11, 2020
Big Data, Analytics & Intelligence Blockchain smart contract can improve data quality but gotcha persists February 6, 2020
Customer Experience / Engagement Gartner predicts the role of privacy officers in 2020 February 4, 2020
Cloud, Virtualization, Operating Environments and Middleware Choosing the best cloud for your business January 31, 2020
Big Data, Analytics & Intelligence Banks blame real-time payments for 78 pct spike in fraud loses January 30, 2020
Big Data, Analytics & Intelligence Vulnerabilities to always follow digital innovation January 27, 2020
Growth Strategies Accenture to acquire Symantec’s cybersecurity services business from Broadcom January 23, 2020
Cloud, Virtualization, Operating Environments and Middleware Synopsys acquires Tinfoil Security to expand DAST, add API security testing January 18, 2020
Cloud, Virtualization, Operating Environments and Middleware Cloud-native security in 2020 January 15, 2020
News Stories IT security budgets lower than average in 45% of SMBs and 50% of enterprises January 10, 2020
Big Data, Analytics & Intelligence China to lead and shape the datasphere in 2020 again January 10, 2020
Government and Public Services DJI introduces the Zenmuse XT S, a new high frame-rate thermal imaging camera January 9, 2020
General Advanced AI, counter threat intelligence seen to shift the traditional advantage of the cybercriminal January 8, 2020
News Stories Top 4 reasons why your management should look into hacker-powered security January 2, 2020
Security Despite a ‘direct line’ to the board, CISOs don’t always get a dedicated budget December 13, 2019
News Stories 2020 cybersecurity threats to arise from Deepfakes, 5G, and public cloud systems, says Forcepoint December 12, 2019
HR, education and Training Third-party user practices expose Singapore Orgs to cybersecurity risks December 10, 2019