Press Release
    January 17, 2025

    TDCX Singapore Reinforces Data Privacy Commitment With Data Protection Trustmark Certification

    TDCX Singapore, an award-winning digital customer experience (CX) solutions provider for technology and blue-chip companies,…
    Bylines
    January 16, 2025

    Config Chaos: How IoT and Cloud Misconfigurations Undermine Security

    By: Antoinette Hodes, Evangelist & Global Solution Architect, Check Point Software Technologies In an increasingly…
    Press Release
    January 16, 2025

    KnowBe4 Research Confirms Effective Security Awareness Training Significantly Reduces Data Breaches

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today released a new…
    Press Release
    January 16, 2025

    Commvault Automates Active Directory Forest Recovery to Protect ‘Keys to the Kingdom’ Amidst Rampant and Debilitating Ransomware Attacks

    Commvault, a leading provider of cyber resilience and data protection solutions for the hybrid cloud,…
    Press Release
    January 16, 2025

    Sophos MDR Defends 26,000 Customers Worldwide with New Enhancements

    Sophos, a global leader of innovative security solutions for defeating cyberattacks, today announced that its…
    Press Release
    January 15, 2025

    Kaspersky Automated Security Awareness Platform Expands Its Courses With Three New Cybersecurity Topics

    As the number of cyberattacks continues to grow, certain types are becoming ever more prevalent.…
    Press Release
    January 15, 2025

    What We Saw in Web Security in 2024 and What We Can Do About It

    The rise of AI-powered attacks, Ransomware-as-a-Service (RaaS) and Zero-day vulnerabilities that focused on the web…
    Press Release
    January 14, 2025

    What to Expect: BlackBerry at AISSE Cybercrime Prevention Summit

    As Malaysia prepares for the AISSE Cybercrime Prevention Summit, held from January 20-22 at the…
    Bylines
    January 14, 2025

    AI’s Rapid Growth Brings New Challenges for CISOs Across Asia in 2025

    By Josh Lemos, Chief Information Security Officer at GitLab 2025 will be a pivotal year…
    Press Release
    January 14, 2025

    Infoblox Threat Intel Research Uncovers Widespread Domain Spoofing Campaigns Targeting Asia

    Infoblox Threat Intel researchers have discovered new insights into the use of spoofed domains in…
      January 7, 2025

      Tech Tarik Think Tank Explores the Future of Digital Identities and Trust

      Technology is catapulting us into a future that is ever more connected, efficient and undeniably digital. And based on the…
      November 6, 2024

      Digital Vendetta: The Malicious Impact of Disgruntled Employees

      While businesses pour resources into defending against cyber attacks from the outside, an often-overlooked risk is a far more personal…
      October 10, 2024

      UNODC Report Reveals Criminal Gangs in Asia Getting Big Assist From AI, Crypto, and More

      Criminals, assemble! That appears to be happening in Asia right now, with organised crime syndicates consolidating their groups and expanding…
      October 2, 2024

      Quantum Threat to Cryptography: Experts Warn of an Extinction-Level Event in Digital Trust

      Quantum computing is hitting the headlines, and most of the time for good reasons. As tech players like Microsoft and…
      September 27, 2024

      Dell’s Triple Breach, a Critical Wake-Up Call for Cybersecurity

      Fool me once, shame on you; fool me twice, shame on me. Fool me thrice, shame on both of us.…
      September 18, 2024

      Goodbye, Passwords. Hello, Passkeys!!

      Earlier this year, Malaysia’s National Cyber Security Agency (NACSA) passed the Cyber Security Act 854, marking a key step in…
      September 11, 2024

      Malaysia Backtracks and Scraps Flawed DNS Blockade

      The Malaysian government, through its communications regulator, the Malaysian Communications and Multimedia Commission (MCMC), has faced a storm of backlash…
      September 11, 2024

      Is My Phone Spying on Me? How Advertisers Are Using AI to Listen to Ambient Conversations for “Better Marketing Analysis”

      Have you ever had a conversation with a friend about a product, and then later, while browsing, an ad for…

      Blogs

        Blogs
        November 18, 2024

        Generative AI & Quantum Risks: Are You Prepared for the Next Wave of Cybersecurity?

        The rise of generative AI is changing the industry and opening doors to creativity and innovation that seemed unattainable just…
        Blogs
        September 26, 2024

        When the Shield Gets Breached: How VPN Vulnerabilities Highlight the Need for Everywhere Security

        With the dust of the remote work revolution finally settling, it’s evident that many businesses have adopted a more hybrid…
        Blogs
        September 18, 2024

        Three Hidden Web Application Vulnerabilities You Need to Know About

        In today’s hyper-connected world, web applications are the backbone of many organisations, driving everything from customer engagement to backend operations.…
        Blogs
        September 5, 2024

        Disrupting the Disruptor: A Step-by-Step Strategy to Stonewall DDoS Attacks

        Service delays are bad for business. Service denial is even worse. Distributed Denial-of-Service (DDoS) attacks can do both, overwhelming a…
        Blogs
        August 27, 2024

        The Criticality of Security: How to Address the Modern Challenge of Securing APIs

        Application Programming Interfaces (API) are dominating the Internet, with successful API requests accounting for 57% of the Internet traffic (dynamic…
        Blogs
        August 13, 2024

        Could Instagram’s New “Feature” Make Stalking Easier?

        Instagram recently rolled out a new “Live Location” feature, which has sparked quite a few discussions, well, mostly concerns regarding…
        Blogs
        August 5, 2024

        The Critical Role of Converged Endpoint Management for Ensuring Enterprise Resilience

        Did you know there are more than 1.4 billion Windows devices currently in use by businesses worldwide? And this figure…
        Blogs
        July 26, 2024

        The Criticality of API Security: Guarding the Gateways of Digital Interactions

        The ability to innovate and utilise digital assets is a differentiator that sets leaders apart from laggards in this digital…