Latest News

Proofpoint CEO: A tool-based approach for cybersecurity is impractical

Akamai: AI-security is both a security imperative and an economic necessity

Gulf Marine upgrades core systems to streamline global operations

NUS sets up AI research centre to develop legal LLM, public health tools

Agility a key motivation behind many digital transformation initiatives

SUBSCRIBE  
iTnews Asia
  • Security
  • Digital Transformation
  • Cloud
  • Data & Analytics
  • Telco
  • Data Centres
  • Industry Movements
  • Content Hub
  • Events
  • Partner Hub
Partner Content Research Media Hub
Executive Roundtable Custom Events Virtual and Hybrid Events
iTnews Asia
Security Digital Transformation Cloud Data & Analytics Telco Data Centres Industry Movements Content Hub
Partner Content Research Media Hub
Events
Executive Roundtable Custom Events Virtual and Hybrid Events
Partner Hub

Stephanie Kelly

Send a message to Stephanie

Recent articles by Stephanie Kelly

Altman joining Microsoft, says Nadella

Altman joining Microsoft, says Nadella

Ex-Twitch boss Emmett Shear is likely to remain OpenAI CEO.
Nov 20 2023 4:10PM

Most Read

  • As AI moves to production, enterprises must confront limits of current stacks
  • Proofpoint CEO: A tool-based approach for cybersecurity is impractical
  • NUS sets up AI research centre to develop legal LLM, public health tools
  • Western Digital – Driving AI forward with smarter data storage
  • The real-life Tom & Jerry chase

Partner Content

Western Digital – Driving AI forward with smarter data storage
Partner Content Western Digital – Driving AI forward with smarter data storage
The hidden costs of digital friction and how IT can reclaim control
Partner Content The hidden costs of digital friction and how IT can reclaim control
The overlooked role of audio technology in modern workspaces
Partner Content The overlooked role of audio technology in modern workspaces
Build Your Fortress, Defend Your Kingdom: 8-Steps to an Effective Cyber Threat Intelligence Program
Partner Content Build Your Fortress, Defend Your Kingdom: 8-Steps to an Effective Cyber Threat Intelligence Program
An introduction to SAP S/4HANA testing
Partner Content An introduction to SAP S/4HANA testing
Contact Us About Us Feedback Advertise Site Map RSS
Lighthouse Independent Media  © 2025 Lighthouse Independent Media.
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.