<
>

BIOMETRIC DATA: RIPE FOR ABUSE AND MISUSE?

by Morey Haber, CTO at BeyondTrust    When classifying the sensitivity of various types of data, few, if any, types of data rank higher in sensitivity than biometric data. Yet, while biometric data is increasingly...

Cyber attacks, building a robust defence as easy as 1,2,3

by James Bergl, Director, Datto APAC The cybersecurity landscape in Singapore and the wider Asia-Pacific region continues to evolve, and the past two years have brought some of the worst cyberattacks we have seen to this...

WHEN A SPEAR PHISHER COMES FOR YOU

by Morey Haber, CTO at BeyondTrust   For starters, this is a true story, and it happened to me. Its relevance to modern cyberattacks is important because, due to a hardware failure, I began engaging with...

Why Businesses Cant Afford to Ignore Ransomware

One of the biggest threats in cybersecurity today is ransomware. Over the last couple of years, many businesses have fallen victim to ransomware attacks which led to millions of dollars of losses. Among the most devastating...

How to Secure Sensitive Data When Data Is Always Accessible

Protecting sensitive information from prying eyes or unauthorised access has always been an important part of business long before the digital revolution. While advancing technology is making data more accessible and actionable...

Bring Your E-Commerce into the Era of Cloud

Digital transformation is no longer a choice for most companies; it has become the norm of doing business. Technology is a crucial enabler of this transformation, providing business owners with the means to gain an edge over the...

Cybersecurity’s #10yearchallenge

While everyone in social media is all hyped up and hooked onto the #10yearchallenge, we at AOPG decided to have a look at another 10-year challenge, cybersecurity. The IT world was a lot different a decade ago. Blockchain...

Exploring Alibaba Cloud - A Real Business Option?

Connectivity is key in today’s digital age. Organisations rely heavily on cloud technology today to keep their businesses at the tip of their fingers. Be it public, private or even hybrid, the cloud has become the most...

How Do Graph Databases Analyse Data?

Analysing security data is critical as it helps organisations have better visibility of their environment. It is important to be able to track and store the interaction of users, machines, applications, network communications,...

Is your organisation at risk to a cyberattack?

Authored by: Jerry Tng, Vice President APAC, Ivanti Data privacy is commonly linked with users’ awareness of data hazards, yet it is also important to be aware of the importance of securing the growing multitude of...