If a predominant number of IT professionals - 60% as per a Ponemon Institute’s research - acknowledge the detrimental consequences of the vulnerabilities...
Acquiring the best security for your organisation's information resources is no longer a question but rather an obligation. While cybersecurity has...
The modern world is highly digital already, and it is digitalising even more. It is largely a good thing but there is a trade-off: A digitalised world is full...
Due to latency, cost, and consumer friction issues, fraud detection models are only performed on fewer than 10% of high-volume transactions today, implying...
Digital transformation is accelerating, priorities are shifting, and working from home has become the new normal. As we continue to traverse this new...
At a recent media event, Palo Alto highlighted that the majority of ASEAN organisations (92%) say cybersecurity is one of the top priorities for business...
Graph technology is undeniably useful, with insight generation using available data now an essential aspect of the modern enterprise. It enables businesses to...
Lapsus$ strikes again, claiming Okta and Microsoft as their most recent victims after breaching into NVIDIA and Samsung. It seemed that even Verizon and...
Viruses are one of the top three categories that Fortinet regards as having a serious impact on Malaysia's security landscape, said Jonas Walker, Security...
It has been three months since the Log4j vulnerabilities were first discovered, and they represent a serious problem that prompted Maya Horowitz, VP of...