Press Release
    January 21, 2025

    Group-IB Joins the Cybercrime Atlas Community at the World Economic Forum To Disrupt Global Cybercrime

    Group-IB, a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime, announced…
    Press Release
    January 21, 2025

    DYXnet Hosts its First Cross-Region Simulated Attack and Defense Exercise to Strengthen Cybersecurity Capabilities

    As technology rapidly evolves, the number and complexity of cyberattacks have increased significantly. To enhance…
    Press Release
    January 21, 2025

    Singtel Partners DSTA and HTX To Enhance Defence and National Security

    Singtel today announced that it has partnered the Defence Science and Technology Agency (DSTA) and…
    Daily News
    January 20, 2025

    Cisco AI Defense: A Revolutionary Step or a Necessary Complexity in AI Security?

    On 16th January 2025, Cisco hosted a virtual roundtable to launch its highly-anticipated Cisco AI…
    Press Release
    January 20, 2025

    Kaspersky Reports Network Security Incidents Dominate With 88% of Companies Targeted by Adversaries

    Throughout 2024, the most common type of security incident faced by companies was related to…
    Press Release
    January 20, 2025

    SAS Viya Achieves StateRAMP Authorisation

    Data and AI leader SAS has achieved StateRAMP authorisation for SAS® AI and Analytics for…
    Press Release
    January 20, 2025

    CrowdStrike Launches Insider Risk Services to Combat Insider Threats

    CrowdStrike) today launched CrowdStrike Insider Risk Services, a comprehensive set of offerings designed to help…
    Press Release
    January 17, 2025

    TDCX Singapore Reinforces Data Privacy Commitment With Data Protection Trustmark Certification

    TDCX Singapore, an award-winning digital customer experience (CX) solutions provider for technology and blue-chip companies,…
    Bylines
    January 16, 2025

    Config Chaos: How IoT and Cloud Misconfigurations Undermine Security

    By: Antoinette Hodes, Evangelist & Global Solution Architect, Check Point Software Technologies In an increasingly…
    Press Release
    January 16, 2025

    KnowBe4 Research Confirms Effective Security Awareness Training Significantly Reduces Data Breaches

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today released a new…
      January 7, 2025

      Tech Tarik Think Tank Explores the Future of Digital Identities and Trust

      Technology is catapulting us into a future that is ever more connected, efficient and undeniably digital. And based on the…
      November 6, 2024

      Digital Vendetta: The Malicious Impact of Disgruntled Employees

      While businesses pour resources into defending against cyber attacks from the outside, an often-overlooked risk is a far more personal…
      October 10, 2024

      UNODC Report Reveals Criminal Gangs in Asia Getting Big Assist From AI, Crypto, and More

      Criminals, assemble! That appears to be happening in Asia right now, with organised crime syndicates consolidating their groups and expanding…
      October 2, 2024

      Quantum Threat to Cryptography: Experts Warn of an Extinction-Level Event in Digital Trust

      Quantum computing is hitting the headlines, and most of the time for good reasons. As tech players like Microsoft and…
      September 27, 2024

      Dell’s Triple Breach, a Critical Wake-Up Call for Cybersecurity

      Fool me once, shame on you; fool me twice, shame on me. Fool me thrice, shame on both of us.…
      September 18, 2024

      Goodbye, Passwords. Hello, Passkeys!!

      Earlier this year, Malaysia’s National Cyber Security Agency (NACSA) passed the Cyber Security Act 854, marking a key step in…
      September 11, 2024

      Malaysia Backtracks and Scraps Flawed DNS Blockade

      The Malaysian government, through its communications regulator, the Malaysian Communications and Multimedia Commission (MCMC), has faced a storm of backlash…
      September 11, 2024

      Is My Phone Spying on Me? How Advertisers Are Using AI to Listen to Ambient Conversations for “Better Marketing Analysis”

      Have you ever had a conversation with a friend about a product, and then later, while browsing, an ad for…

      Blogs

        Blogs
        November 18, 2024

        Generative AI & Quantum Risks: Are You Prepared for the Next Wave of Cybersecurity?

        The rise of generative AI is changing the industry and opening doors to creativity and innovation that seemed unattainable just…
        Blogs
        September 26, 2024

        When the Shield Gets Breached: How VPN Vulnerabilities Highlight the Need for Everywhere Security

        With the dust of the remote work revolution finally settling, it’s evident that many businesses have adopted a more hybrid…
        Blogs
        September 18, 2024

        Three Hidden Web Application Vulnerabilities You Need to Know About

        In today’s hyper-connected world, web applications are the backbone of many organisations, driving everything from customer engagement to backend operations.…
        Blogs
        September 5, 2024

        Disrupting the Disruptor: A Step-by-Step Strategy to Stonewall DDoS Attacks

        Service delays are bad for business. Service denial is even worse. Distributed Denial-of-Service (DDoS) attacks can do both, overwhelming a…
        Blogs
        August 27, 2024

        The Criticality of Security: How to Address the Modern Challenge of Securing APIs

        Application Programming Interfaces (API) are dominating the Internet, with successful API requests accounting for 57% of the Internet traffic (dynamic…
        Blogs
        August 13, 2024

        Could Instagram’s New “Feature” Make Stalking Easier?

        Instagram recently rolled out a new “Live Location” feature, which has sparked quite a few discussions, well, mostly concerns regarding…
        Blogs
        August 5, 2024

        The Critical Role of Converged Endpoint Management for Ensuring Enterprise Resilience

        Did you know there are more than 1.4 billion Windows devices currently in use by businesses worldwide? And this figure…
        Blogs
        July 26, 2024

        The Criticality of API Security: Guarding the Gateways of Digital Interactions

        The ability to innovate and utilise digital assets is a differentiator that sets leaders apart from laggards in this digital…