Cybersecurity

red and black love lock

9 Reasons APAC businesses should prioritize privileged access management

With privileges come responsibilities – and risks. In a region as dynamic and digitally connected as the Asia Pacific region, the stakes are high. From cyber attacks to regulatory fines to reputational harm, unmanaged privileged access is a vulnerability no business can afford. By investing in a zero trust-based PAM solution, organizations gain visibility,…

a red background with circles and dots

Getting ready for a secure AI and post-quantum world

To stay ahead, organizations need a layered security approach – one that doesn't rely on a single tool or solution, but instead uses multiple defenses working together. This strategy helps block threats at different points, limits damage if an attack does happen, and improves overall resilience.

Sumsub: healthtech, fintech sectors most exposed to new wave of AI-powered fraud in APAC

New data released by global verification provider Sumsub, revealed that healthtech and fintech sectors are the most exposed to the new wave of artificial intelligence (AI)- powered fraud in Asia Pacific (APAC).

NTT DATA and Booz Allen Hamilton forge cybersecurity alliance in Singapore

NTT DATA, a Japan-based digital business and technology services provider, has entered into a memorandum of understanding (MOU) with Booz Allen Hamilton, a United States-based technology solutions firm, to strengthen cybersecurity solutions in Singapore and the broader Indo-Pacific region.

Arctic Wolf expands into Singapore to meet rising demand for AI-powered security operations

Arctic Wolf, a US-based security operations firm, has announced its official launch in Singapore, marking the latest milestone in its ongoing expansion across the Asia-Pacific region.

Philippines’ Nexus Technologies partners Resecurity to advance cybersecurity capabilities

Nexus Technologies Inc., a next-generation technology solutions provider based in the Philippines, has partnered with Resecurity, a global cybersecurity and threat intelligence, to jointly advance cybersecurity capabilities and promote digital resilience across public and private sectors.

woman in white shirt sitting on chair

Staying one step ahead of ransomware attacks in 2025

To build resilience, companies are advised to implement robust incident response plans and do everything it takes to detect threats in time. This includes maintaining secure backups and investing in continuous threat monitoring. AI-driven threats like identity theft and social engineering scams will foreseeably evolve in the meantime, which raises the need…

black and white round illustration

Cyber resilience: Current and future trends

As cyber threats continue to evolve, organizations have to treat resilience as a priority. True cyber resilience demands much more than the newest tools, requiring a fundamental shift in mindset, where security is woven into every aspect of operations. Organizations must combine cutting-edge technologies with robust processes and strong governance. On the…

a person is casting a vote into a box

When truth is weaponized: How do we protect trust at the ballot box?

Building a collective defense requires not only robust technological safeguards but also an informed, critical, and vigilant population empowered to discern truth from manipulation.

A close up of a computer circuit board

Risk rewired: Are we teaching AI the wrong things about uncertainty?

Unless we rethink our approach to uncertainty, we won’t just automate today’s blind spots. We’ll institutionalize them. Instead of building AI that is adaptive, predictive, and resilient, we’ll train it to mirror our limitations.