Cybersecurity

a woman in a blue shirt and purple tie

Account recovery as an identity problem: How to safely re-establish trust before a password reset

We still treat account recovery like a minor inconvenience. A login fails, users click “reset password,” and move on. But in 2026, the problem isn’t about restoring access—it’s about identity.

woman in white shirt sitting on chair

From data to decisions: Threat intelligence in SOC operations

Threat intelligence has moved far beyond feed ingestion and indicator matching. In a modern security operations center, it helps teams interpret alerts in context, improve detection engineering, guide threat hunting, and sharpen incident response. As cyber threats grow more complex, integrating threat intelligence into daily SOC workflows can help…

world map wall decor

Why geopolitical conflict is making AI risk a business continuity issue

AI risk is no longer confined to cybersecurity teams. As geopolitical conflict disrupts both physical and digital systems, businesses are being pushed to treat AI exposure as part of continuity planning.

Why cybersecurity is becoming an integral part of the AI infrastructure story

As AI becomes more deeply embedded in enterprise systems, cybersecurity is starting to look less like a separate layer of defense and more like part of the infrastructure story itself. In Southeast Asia, that shift could shape how securely and sustainably the next phase of AI growth unfolds.

Singapore Singtel AI platform RE:AI, California-based Cohesity partner on AI search for backup data

Sovereign AI cloud platform RE:AI of Singapore-headquartered Singtel Digital InfraCo has partnered with California-based Cohesity to develop a service that enables enterprises to convert backup archives into searchable data sources for artificial intelligence applications.

Google to require verification for financial ads in Malaysia

To further protect Malaysians against financial scams, Google introduced new certification requirements for financial services advertisers targeting Malaysia.

A woman with binary code lights projected on her face, symbolizing technology.

Seeing the unseen: Why full visibility is the cornerstone of cyber defense

Achieving visibility is not a one-time project but a continuous discipline. It involves aligning data sources, integrating detection tools, and adopting a mindset where infrastructure is treated as an evolving ecosystem rather than a static perimeter.

A laptop computer sitting on top of a desk

Top 6 AI-powered threats to enterprises

AI is making enterprise threats faster, more convincing, and harder to contain, from phishing and deepfake impersonation to faster exploit development and data leakage through unsanctioned tools. The real challenge is not just adopting AI quickly, but strengthening identity checks, data controls, and response playbooks before these amplified risks turn into…

Indosat Ooredoo Hutchison sets up Security Command Center in Indonesia with Cisco

Indosat Ooredoo Hutchison (Indosat), has officially launched its Security Command Center (SCC) in Jakarta, marking a significant leap forward for Indonesia’s digital resilience as artificial intelligence (AI) rapidly transforms the threat landscape.

Laptop screen displaying code with a coffee mug.

LookOut: How two vulnerabilities in Google Looker could put enterprise data at risk

As organizations rely more heavily on integrated platforms, those platforms naturally become concentrated points of failure. The more systems a tool connects to, the greater the blast radius if something goes wrong.