Cybersecurity

silhouette photography of man

Enterprises rethink defense as cybercrime scales to industrial proportions

As cybercrime evolves into a regional industry, defensive strategies require matching coordination, intelligence sharing, and operational discipline. Success in 2026 won't belong to organizations with the most tools, but to those who truly understand attack patterns and execute with unwavering cybersecurity hygiene.

a person standing in front of a large building with many letters on it

The transitional decade: Why mythos is a problem for legacy code, not for cybersecurity vendors

Mythos's capabilities are real — Cybench and OpenBSD settle that. The harder problem is how the world gets through the window between a system built on the assumption that vulnerability discovery is expensive and a system in which it isn't, without cascading failures in exactly the infrastructure least able to be rewritten. 

Malaysia regulators team up to strengthen scams prevention and enforcement

The Securities Commission Malaysia (SC) and the Malaysian Communications and Multimedia Commission (MCMC) have on Friday agreed to further enhance cooperation in enforcement and strengthen efforts in mitigating and preventing scams.

Why OpenClaw is forcing a rethink of AI security, trust, and authority

OpenClaw has become a useful case study for a bigger shift in AI. As agents move from generating answers to taking actions across inboxes, browsers, files, and tools, the real issue is no longer only model accuracy. It is now about authority, trust boundaries, and whether organizations are ready to govern software that can act on their behalf.

a woman in a blue shirt and purple tie

Account recovery as an identity problem: How to safely re-establish trust before a password reset

We still treat account recovery like a minor inconvenience. A login fails, users click “reset password,” and move on. But in 2026, the problem isn’t about restoring access—it’s about identity.

woman in white shirt sitting on chair

From data to decisions: Threat intelligence in SOC operations

Threat intelligence has moved far beyond feed ingestion and indicator matching. In a modern security operations center, it helps teams interpret alerts in context, improve detection engineering, guide threat hunting, and sharpen incident response. As cyber threats grow more complex, integrating threat intelligence into daily SOC workflows can help…

world map wall decor

Why geopolitical conflict is making AI risk a business continuity issue

AI risk is no longer confined to cybersecurity teams. As geopolitical conflict disrupts both physical and digital systems, businesses are being pushed to treat AI exposure as part of continuity planning.

Why cybersecurity is becoming an integral part of the AI infrastructure story

As AI becomes more deeply embedded in enterprise systems, cybersecurity is starting to look less like a separate layer of defense and more like part of the infrastructure story itself. In Southeast Asia, that shift could shape how securely and sustainably the next phase of AI growth unfolds.

Singapore Singtel AI platform RE:AI, California-based Cohesity partner on AI search for backup data

Sovereign AI cloud platform RE:AI of Singapore-headquartered Singtel Digital InfraCo has partnered with California-based Cohesity to develop a service that enables enterprises to convert backup archives into searchable data sources for artificial intelligence applications.

Google to require verification for financial ads in Malaysia

To further protect Malaysians against financial scams, Google introduced new certification requirements for financial services advertisers targeting Malaysia.