Tue, 28 Apr 2026

Okta Device Access to help organisations mature their zero trust strategy

Okta launched a new product that enables organisations to extend Okta’s Identity and Access Management (IAM) capabilities to secure access to corporate devices for a hybrid workforce. As part of Okta’s Workforce Identity Cloud, the solution will deliver stronger authentication to unlock a device, helping organisations achieve zero trust while simplifying the login experience for […]

Is your Southeast Asia business cyber-compliant?

Southeast Asia has seen significant increases in cybersecurity compliance and regulation over the past year, as countries mobilise against cyberattacks which continue to grow in frequency, sophistication, and severity. Moving on from the pandemic has not been a walk in the park for businesses here, with 75% reporting to have fallen victim to at least […]

Survey reminds us: Not all MFA are created equal

Coming to the end of Cybersecurity Awareness month 2022, it is good to be reminded that hackers do not always need to break in. Through phishing and social engineering, they are now logging in to companies, governments and individuals. Data from the State of Global Enterprise Authentication Survey 2022, conducted Censuswide on behalf of Yubico, […]

MFA and SSO are top zero-trust implementations

A survey of 185 US companies, including multinational operations, global telecommunications market research and consulting firm, TeleGeography, revealed that 35% of WAN managers implemented one or more elements of zero-trust security (ZTS) and Secure Access Service Edge (SASE) on at least some of their company’s networks in 2021. The survey also reveals that close to […]

To pay, or not to pay, that is the question

Ransomware attacks continue to skyrocket and pose serious financial and legal issues to organisations in Asia Pacific. When fallen prey to such attacks, most enterprises would choose to pay the ransom. However, supporting the attackers’ business model by paying the ransom only encourages ongoing criminal activity and will only lead to more ransomware attacks subsequently. […]

FutureCISO Security Alert: Worst cyber security vulnerability

Log4J is a logging library for Java. It is used to debug software during its development lifecycle and entails inserting log statements into code. It is developed and maintained by the open-source Apache Software Foundation and runs on all major platforms including Windows, Linux, and Apple’s macOS. On 24 November 2021, a member of Alibaba’s […]

Subscribe