Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Agentic RAG: Key to turning APAC’s AI pilots into profits?
Are alert overloads and rising AI ambitions linked to increased platfo...
Nexusguard Releases 2025 DDoS Threat Analysis and Industry Perspective...
SU Group Launches Expanded AI Security Offering to Meet Surging Global...
How a Vietnamese D2C retailer built its own secure digital infrastruct...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Agentic RAG: Key to turning APAC’s AI pilots into profits?

      Agentic RAG: Key to turning APAC’s AI pilots into profits?

      Tuesday, May 19, 2026, 2:15 PM Asia/Singapore | Features
    • Featured

      How a Vietnamese D2C retailer built its own secure digital infrastructure

      How a Vietnamese D2C retailer built its own secure digital infrastructure

      Monday, May 18, 2026, 2:21 PM Asia/Singapore | Case Study, Features
    • Featured

      Are AI-powered cyber threats evolving faster than courts and police can adapt?

      Are AI-powered cyber threats evolving faster than courts and police can adapt?

      Monday, May 11, 2026, 8:30 AM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • AWARDS 2026
  • Directory
  • E-Learning

Select Page

Features

Agentic RAG: Key to turning APAC’s AI pilots into profits?

By Victor Ng | Tuesday, May 19, 2026, 2:15 PM Asia/Singapore

Agentic RAG: Key to turning APAC’s AI pilots into profits?

Most enterprises are investing heavily in agentic AI, but many still struggle to deploy it at scale or to create sustained business value.

This refrain in the AI adoption narratives unfortunately seems to hold true over the last 12 months. Why? Because the true cost of deploying AI without the right architecture can be prohibitive.

Retrieval-augmented generation (RAG) improves on standalone LLMs by generating responses using sources outside its training data. This approach can dramatically reduce the occurrence of AI hallucinations.

But is agentic RAG the missing bridge between APAC’s AI experimentation and real ROI?

In this interview with Eudald Camprubí, Software Fellow, Progress Software, we discover that what separates experimental AI from production-ready is not ‘model intelligence’, but ‘retrieval intelligence’. 

Gartner predicts that, in 2026, organizations will abandon 60% of AI projects that aren’t supported by high-quality, AI-ready data. How does an effective retrieval strategy help resolve this major pain point?

Eudald Camprubí (EC): Gartner highlights a simple but critical idea: AI is only as good as the data it uses. However, organizations often underestimate how important it is to prepare their data properly.

Making data AI-ready means more than just storing it. It involves organizing and enriching it so AI can understand it. This includes tasks like indexing different file types, extracting key information, identifying entities, generating summaries and even describing images or tables automatically.

This preparation is essential for effective retrieval, which is how AI finds the right information to answer a question. Different teams, such as marketing or legal, need different types of information, so retrieval must adapt to each use case.

By ensuring data is well-prepared and applying the right retrieval strategies, companies can make their AI projects more reliable and valuable in real-world use.

What is the role of agentic RAG in closing the loop between AI pilots and real workflows to make AI strategies more time- and cost-efficient? 

EC: Agentic RAG provides essential capabilities to help enterprises confidently deploy AI solutions in production in a cost-efficient way and within weeks rather than months.

First, it offers quality metrics for every generated answer. In practice, no organization will deploy an AI solution without ensuring that outputs are accurate, grounded in their own data and free from hallucinations. Capabilities like REMi (RAG Evaluation Metrics), using an LLM evaluating other LLMs outputs, are critical to building trust in the system and ensuring consistent, high-quality results.

In addition, experimentation is key. Organizations need the ability to compare different models and retrieval strategies in controlled environments, understanding both output quality and cost (such as token consumption) without impacting production.

Equally important is providing intuitive tools that can be used not only by technical teams but also by business users. This allows all stakeholders to understand, fine-tune and control the AI pipeline, helping reduce costs, save time and ensure that deployments deliver real business value.

Does a retrieval strategy matter more than an LLM? Why?

EC: I like to say that retrieval is the king of RAG. It is an essential component, and without it, it would not be possible to generate high-quality outputs from internal data using an LLM.

However, as mentioned earlier, the most important aspect of AI is still the data itself. Ensuring that data is properly prepared and AI-ready is critical when starting any AI project, especially those that rely on querying internal organizational data.

Once the data is AI-ready and properly stored, retrieval becomes the key factor. It involves understanding user intent and selecting only the most relevant information needed to answer a query.

Even with the best LLM, without the right context gathered during the retrieval phase, the output will not be reliable.

In this sense, while LLMs are important, retrieval is the foundation of any RAG system and essential for effectively using both structured and unstructured data.

Share:

PreviousAre alert overloads and rising AI ambitions linked to increased platform-based, AI-powered security?

Related Posts

Telemedicine and Telehealth comes with diverse new cyber risks: Are they well covered?

Telemedicine and Telehealth comes with diverse new cyber risks: Are they well covered?

Monday, September 7, 2020

Microsegmentation – the zero trust shift from breach prevention to breach readiness

Microsegmentation – the zero trust shift from breach prevention to breach readiness

Wednesday, September 11, 2024

Gaming operators in the region struggle with a cyber game they dread losing

Gaming operators in the region struggle with a cyber game they dread losing

Wednesday, November 2, 2022

Hidden security risks in cloud architecture despite Zero Trust

Hidden security risks in cloud architecture despite Zero Trust

Tuesday, September 26, 2023

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • How a Vietnamese D2C retailer built its own secure digital infrastructure

    How a Vietnamese D2C retailer built its own secure digital infrastructure

    Would your organization build your own digital infrastructure – including AI governance and cybersecurity – …Read more
  • Cyber protection for medical clinics in Singapore

    Cyber protection for medical clinics in Singapore

    As Singapore’s healthcare sector becomes increasingly digital and interconnected, clinics are facing heightened cyber risks, …Read more
  • India’s WazirX strengthens governance and digital asset security

    India’s WazirX strengthens governance and digital asset security

    Revamping its custody infrastructure using multi‑party computation tools has improved operational resilience and institutional‑grade safeguardsRead more
  • Bangladesh LGED modernizes communication while addressing data security concerns

    Bangladesh LGED modernizes communication while addressing data security concerns

    To meet emerging data localization/privacy regulations, the government engineering agency deploys a secure, unified digital …Read more

Bottom sidebar

Other News

  • Nexusguard Releases 2025 DDoS Threat Analysis and Industry Perspectives Report

    Tuesday, May 19, 2026
    Designed to inform enterprise security …Read More »
  • SU Group Launches Expanded AI Security Offering to Meet Surging Global Demand

    Monday, May 18, 2026
    HONG KONG, May 18, 2026 …Read More »
  • Cohesity Expands Strategic Alliance with HPE to Deliver Industry-Leading Cyber Resilience, Data Protection, and Hybrid Cloud Solutions

    Saturday, May 16, 2026
    SINGAPORE, May 15, 2026 /PRNewswire/ …Read More »
  • SwitchBot Launches Lock Vision Series, the World’s First Smart Deadbolt Locks with 3D Structured-Light Facial Recognition

    Friday, May 15, 2026
    TOKYO, May 15, 2026 /PRNewswire/ …Read More »
  • SU Group Announces Pricing of $6 Million Public Offering

    Tuesday, May 12, 2026
    HONG KONG, May 12, 2026 …Read More »
  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2026 CybersecAsia All Rights Reserved.