Sudden change brings novelty, and novelty brings opportunity for scammers. That is what the gaping WFH movement is all about. As we all adjust to working remotely, security teams across the world are ...
As 2025 approaches, organizations will need to prioritize data security in the cloud amid the rapid rise of AI adoption. To guide their security planning, knowing some forecasts based on key 2024 ...
In a fast-evolving threat and technology landscape, cybersecurity together with digital transformation has become a top-of-mind issue at the Board and C-suite levels for organizations across all ...
In our latest poll* of CXOs across the world on what’s top of their mind, C-suite leaders from the Asia Pacific region had ranked deepfakes at the bottom (number five) of their short list of ...
Given the hallucinations and other unexpected behavior, can GenAI be used safely for cybersecurity? Here are some factors to consider. The arrival of generative (GenAI) and its seemingly endless ...
Justifying IT budgets is tough, but if we shift to a more realistic cybersecurity mindset, maximizing every cent spent becomes easier The old adage of “do more with less” is relevant to IT and ...
So goes the mantra: never trust, always verify; encrypt data; least privilege until more is justified; and surveil for abnormal behavior. The concept of zero trust can be reduced to “never trust and ...
Communications service providers (CSPs) across Asia Pacific need to prepare themselves to plug the cybersecurity gaps and mitigate against the risks of the 5G world. Now that remote working has become ...
As global cyber threats grow in sophistication and frequency, Malaysia’s National Cyber Security Agency (NACSA) has also stepped up efforts to safeguard the country’s infrastructure. The agency’s CEO, ...
The world seems hell-bent on monetizing its own self-created AI hype, and threat actors are hell-bent on exploiting this The reported growing adoption of AI in data centers has driven the need for ...
Should your organization move your database to the cloud? How well can cloud security concerns be mitigated? On-premise databases are often used by organizations to store sensitive data as they are ...
Organizations resisting the migration from traditional to more-automated data backup/recovery and DR plans should consider the factors described here AI is revolutionizing modern backup and disaster ...