Security

Malaysia secures communications for the upcoming ASEAN Summit

Malaysia secures communications for the upcoming ASEAN Summit

To protect people and data during high-level regional meetings.
Oct 22 2025 12:29PM
Ransomware gang Qilin claims attack on Japan’s Asahi breweries

Ransomware gang Qilin claims attack on Japan’s Asahi breweries

Orders, shipments and customer support affected as the company investigates.
Oct 8 2025 4:23PM
IMDA and Enterprise Singapore launch SME-focused cybersecurity initiative

IMDA and Enterprise Singapore launch SME-focused cybersecurity initiative

Free cybersecurity tools and workshops to strengthen small businesses.
Oct 8 2025 2:52PM
Cyberthreats are now targeting critical infrastructure on a larger scale

Cyberthreats are now targeting critical infrastructure on a larger scale

As digital and physical environments converge, is your IT and OT strong enough to stave off a sophisticated cyberattack?
Oct 7 2025 3:09PM
Gemini vulnerabilities threaten potential exposure of user data

Gemini vulnerabilities threaten potential exposure of user data

Flaws patched, but careful AI management remains essential.
Oct 1 2025 12:47PM
Best practice tips for secure password management

Best practice tips for secure password management

In today’s digital account-driven world, good password security is critical to making your business safer.
Sep 16 2025 7:14PM
Are third-party blind spots the weakest link in enterprise cybersecurity chain?

Are third-party blind spots the weakest link in enterprise cybersecurity chain?

Security practices have not kept pace with cloud adoption.
Sep 10 2025 2:33PM
Five tips a CIO or CSO should know to stop employee-driven IP theft

Five tips a CIO or CSO should know to stop employee-driven IP theft

Even the best cybersecurity systems can be outsmarted by a determined insider.
Aug 20 2025 12:24PM
StarHub launches app to protect customers from scam calls and SMS

StarHub launches app to protect customers from scam calls and SMS

Blocks fraudulent calls, filters spam texts, and updates scam database in real time.
Aug 18 2025 2:08PM
Beware the rise of ‘vishing’ as a cyber threat in APAC

Beware the rise of ‘vishing’ as a cyber threat in APAC

This insidious form of social engineering preys on our trust in voice communication.
Aug 14 2025 11:05AM
Proofpoint CEO: A tool-based approach for cybersecurity is impractical

Proofpoint CEO: A tool-based approach for cybersecurity is impractical

What’s changed in the threat landscape? It's much wider now, and criminals are using AI and sophisticated tools to attack in volume.
Aug 7 2025 1:59PM
Akamai: AI-security is both a security imperative and an economic necessity

Akamai: AI-security is both a security imperative and an economic necessity

Each API incident today is costing Asia Pacific enterprises more than half a million in losses each.
Aug 6 2025 12:25PM
The real-life Tom & Jerry chase

The real-life Tom & Jerry chase

The relationship between cybercriminals and us draws a parallel to the classic cat-and-mouse cartoon
Jul 25 2025 2:33PM
How can we bolster our resilience against AI-enabled e-mail attacks?

How can we bolster our resilience against AI-enabled e-mail attacks?

When a new vulnerability is found on platform or device, organisations only have hours to patch, not days.
Jul 22 2025 12:21PM
Qantas hit by cyberattack, data of six million customers exposed

Qantas hit by cyberattack, data of six million customers exposed

Manila-based call centre targeted in vishing attack; names, contact details and frequent flyer numbers stolen.
Jul 3 2025 11:06AM
Your organisation’s physical security can be a gateway for cybercriminals

Your organisation’s physical security can be a gateway for cybercriminals

Businesses that rely heavily on physical security and data protection need to look towards a converged surveillance strategy.
Jun 24 2025 1:38PM
The best way to outsmart your threat actors is to think like one

The best way to outsmart your threat actors is to think like one

Relying soley on your cloud provider for your cyber defence can lead to a false sense of security.
Jun 12 2025 1:13PM
How cybercriminals are exploiting LLMs to harm your business

How cybercriminals are exploiting LLMs to harm your business

Don’t assume LLMs will operate as expected, nor that their safeguards are foolproof.
May 30 2025 12:23PM
Is identity now the next parameter of cybersecurity breaches?

Is identity now the next parameter of cybersecurity breaches?

The rise of remote work and increased reliance on cloud services are expanding attack surfaces, making identity protection even more challenging than before.
May 13 2025 1:20PM
Cybersecurity threats CISOs should be most worried about in 2025

Cybersecurity threats CISOs should be most worried about in 2025

GenAI-driven extortion is driving breaches and replacing traditional ransomware.
May 8 2025 5:03PM