Press Release
    November 28, 2024

    Financial Phishing Continues to Be Menace to SEA Companies—Kaspersky

    From January to June 2024, Kaspersky anti-phishing technologies detected 336,294 financial phishing attacks launched at…
    Press Release
    November 28, 2024

    Williams Racing Chooses Keeper Security to Safeguard Data in Formula 1’s High-Stakes, Data-Driven World

    Keeper Security, the leading provider of zero-trust and zero-knowledge cybersecurity software protecting passwords, passkeys, privileged…
    Bylines
    November 28, 2024

    Beyond Legislation: How Businesses Can Build Resilient Cybersecurity Frameworks

    By Scott Hagenus, Security Solutions Director, Crayon Cyber threats are escalating across Southeast Asia and…
    Cyber Safety
    November 27, 2024

    Sleepless Nights & Security Gaps: Why Automation Is Your Cybersecurity Ally

    Contrary to popular belief, the most significant obstacle to advancing security is not budget constraints…
    Bylines
    November 27, 2024

    Everything Old is New Again: AI-Driven Development and Open Source

    By: Fred Bals, Senior Security Researcher, Black Duck Remember how quickly open source software went from…
    Press Release
    November 27, 2024

    Trend Micro Safeguards Cloud Data of Healthcare AI Innovation Leader

    Trend Micro Incorporated, a global cybersecurity leader, continues to lead the way in cloud security…
    Press Release
    November 27, 2024

    ThreatLabz Report: Singapore Is Second Most Targeted APJ Nation for Mobile Malware Attacks in 2024

    Zscaler, Inc., the leader in cloud security, has published its “Zscaler ThreatLabz 2024 Mobile, IoT,…
    Press Release
    November 27, 2024

    Akamai Extends Microsegmentation to AWS, Enhances ZTNA for Optimal App Performance

    Akamai Technologies, Inc., the cybersecurity and cloud computing company that powers and protects business online,…
    Press Release
    November 27, 2024

    Strengthening Security in the AI Era: Alibaba Cloud Enhances Security Products for Diverse Cloud Environments

    In response to the growing trend of organisations adopting multi-cloud and hybrid cloud environments, where…
    Press Release
    November 26, 2024

    CyberArk, Wiz Team Up to Provide Complete Visibility, Control for Cloud-Created Identities

    CyberArk, the global leader in identity security, has announced a high-impact partnership with leading cloud security…
      November 6, 2024

      Digital Vendetta: The Malicious Impact of Disgruntled Employees

      While businesses pour resources into defending against cyber attacks from the outside, an often-overlooked risk is a far more personal…
      October 10, 2024

      UNODC Report Reveals Criminal Gangs in Asia Getting Big Assist From AI, Crypto, and More

      Criminals, assemble! That appears to be happening in Asia right now, with organised crime syndicates consolidating their groups and expanding…
      October 2, 2024

      Quantum Threat to Cryptography: Experts Warn of an Extinction-Level Event in Digital Trust

      Quantum computing is hitting the headlines, and most of the time for good reasons. As tech players like Microsoft and…
      September 27, 2024

      Dell’s Triple Breach, a Critical Wake-Up Call for Cybersecurity

      Fool me once, shame on you; fool me twice, shame on me. Fool me thrice, shame on both of us.…
      September 18, 2024

      Goodbye, Passwords. Hello, Passkeys!!

      Earlier this year, Malaysia’s National Cyber Security Agency (NACSA) passed the Cyber Security Act 854, marking a key step in…
      September 11, 2024

      Malaysia Backtracks and Scraps Flawed DNS Blockade

      The Malaysian government, through its communications regulator, the Malaysian Communications and Multimedia Commission (MCMC), has faced a storm of backlash…
      September 11, 2024

      Is My Phone Spying on Me? How Advertisers Are Using AI to Listen to Ambient Conversations for “Better Marketing Analysis”

      Have you ever had a conversation with a friend about a product, and then later, while browsing, an ad for…
      September 9, 2024

      How Deepfakes of Prominent Figures Are Fuelling Investment Scams in Malaysia

      The Securities Commission Malaysia (SC) recently sounded the alarm about deepfake investment scams. These scams reportedly harnessed the power of…

      Blogs

        Blogs
        September 26, 2024

        When the Shield Gets Breached: How VPN Vulnerabilities Highlight the Need for Everywhere Security

        With the dust of the remote work revolution finally settling, it’s evident that many businesses have adopted a more hybrid…
        Blogs
        September 18, 2024

        Three Hidden Web Application Vulnerabilities You Need to Know About

        In today’s hyper-connected world, web applications are the backbone of many organisations, driving everything from customer engagement to backend operations.…
        Blogs
        September 5, 2024

        Disrupting the Disruptor: A Step-by-Step Strategy to Stonewall DDoS Attacks

        Service delays are bad for business. Service denial is even worse. Distributed Denial-of-Service (DDoS) attacks can do both, overwhelming a…
        Blogs
        August 27, 2024

        The Criticality of Security: How to Address the Modern Challenge of Securing APIs

        Application Programming Interfaces (API) are dominating the Internet, with successful API requests accounting for 57% of the Internet traffic (dynamic…
        Blogs
        August 13, 2024

        Could Instagram’s New “Feature” Make Stalking Easier?

        Instagram recently rolled out a new “Live Location” feature, which has sparked quite a few discussions, well, mostly concerns regarding…
        Blogs
        August 5, 2024

        The Critical Role of Converged Endpoint Management for Ensuring Enterprise Resilience

        Did you know there are more than 1.4 billion Windows devices currently in use by businesses worldwide? And this figure…
        Blogs
        July 26, 2024

        The Criticality of API Security: Guarding the Gateways of Digital Interactions

        The ability to innovate and utilise digital assets is a differentiator that sets leaders apart from laggards in this digital…
        Blogs
        July 22, 2024

        What Organisations Need to Do to Mitigate the Devastating Impact of Cyber Attacks on Critical Infrastructure

        Imagine hospitals going dark during surgery, traffic lights turning off at rush hour, Internet service bogging down, sensitive customer data…