<
>

Micro Focus CTO Niel Pandya Highlights the Need for DevSecOps in Exclusive Interview

There is a vital component to DevOps that companies need to be taking into account: Security. Adding this security component transforms DevOps into DevSecOps and keeps the software supply chain secure against cyber attackers...

Feature Story Video: Mobile Phones The Cyber Security Weak Point

Wake up, get out of bed, freshen up, eat and get on with work at home is the morning routine of most remote workers. No need to brave the morning traffic jams or the packed public transport because technology has made things...

Microsoft's Cyber Security Credibility

The hybrid working model is here to stay! However, as more employees are now working on both corporate and home networks, for businesses, this means that the network parameter is suddenly devoid of defined boundaries. Given...

Noname Security Shares Best Practices for Securing Against API Threats

You may or may not have heard of APIs, but whether you’re aware of them or not, you’re already using them in your day to day activities. API stands for Application Programming Interface. To put it simply, an API...

Tenable Studio Thailand Interview (Thai)

Suwitcha Musijaral, Security Consultant at Tenable Thailand talks with Waree Chong at AOPG about Thailand's cybersecurity laws and the threats and vulnerabilities the information and communication infrastructure are...

Bringing the Zero Trust Mindset to Protect Your Data from Cyber Threats

Data is the new oil. The value and importance of data is set to fuel the digital economy into the next era. However, where there's value, there will be those who wish to steal it. In this case, it comes in the form of cyber...

ISS Data as the leading SAP ByDesign Enabler in Singapore

DSA interviews the Head of Customer Engagement from ISS Data, Mr Pohlim Koo to find out its role as the leading SAP ByDesign enabler in Singapore.

Tenable Studio Interview (Bahasa Indonesia)

Rio Sibuea, Security Consultant at Tenable Jakarta talks with Amira Yazmien at AOPG about the ransomware threat plaguing Indonesian businesses and how how Tenable can help. "This video is in Bahasa Indonesia"

The Challenge for CSPs in DDoS Attacks and Beyond

Distributed Denial of Service or DDoS is evolving – the attack is now more frequent and damaging than ever before. Cybercriminals use IoT technologies, mobile devices, bots and malware to access network, which could lead...

Understanding Managed Security Services

Organisations are now finding that their digital footprint and security perimeters have widened tremendously and they are subjected to more diverse cybersecurity threats and attacks than ever. LifeTech's Evan Loh...