Observability, platformization keys to cybersecurity in the AI era
In the hybrid-cloud hybrid-work era, organizations need real-time insights and visibility, especially when security is becoming an “AI-vs-AI” race.
Read MoreSelect Page
By Victor Ng | Thursday, August 8, 2024, 5:27 PM Asia/Singapore | Features, Newsletter
In the hybrid-cloud hybrid-work era, organizations need real-time insights and visibility, especially when security is becoming an “AI-vs-AI” race.
Read MoreBy CybersecAsia editors | Thursday, August 8, 2024, 10:17 AM Asia/Singapore | News, Newsletter
A globally-used software to guard against people’s overuse of mobile devices has been found with its guard down
Read MoreBy Contributors, Check Point Research | Tuesday, August 6, 2024, 2:12 PM Asia/Singapore | Newsletter, Tips
The risks and potential damages from cyberattacks and “unforseen” tech outages and bugs in the algorithms need to be clearly understood
Read MoreBy Darren Guccione, CEO and Co-Founder, Keeper Security | Tuesday, August 6, 2024, 1:58 PM Asia/Singapore | Newsletter, Tips
Can hyper-realistic silicon masks beat facial recognition biometric authentication systems? Maybe passwords are still useful…
Read MoreBy CybersecAsia editors | Monday, August 5, 2024, 3:25 PM Asia/Singapore | News, Newsletter
Among the 207 respondents representing the region, 39% did indicate plans to implement tighter governance within the next year
Read MoreBy L L Seow | Monday, August 5, 2024, 2:48 PM Asia/Singapore | Features, Newsletter
While global cyber regulators rush to catch up with high-speed techno crime growth, the financial industry is catching its bated breath…
Read MoreBy CybersecAsia editors | Friday, August 2, 2024, 9:26 AM Asia/Singapore | Case Study, News, Newsletter
This is what a recent mini survey among Asia Pacific developers and IT administrators suggests as a prescription for responsible AI.
Read MoreBy L L Seow | Thursday, August 1, 2024, 10:10 AM Asia/Singapore | Newsletter, Tips
Generations of casual lying, PsyOps, propaganda and truth-bending have culminated into an era of not just information, but also normalized prevarication
Read MoreBy CybersecAsia editors | Wednesday, July 31, 2024, 10:21 AM Asia/Singapore | News, Newsletter
Operating under the Distribution-as-a-Service model, such hackers can infiltrate developers’ code to distribute phishing and malware elements surreptitiously
Read MoreBy B Swaminathan | IMAWS | Tuesday, July 30, 2024, 1:58 PM Asia/Singapore | Features, Newsletter
Find out what the industry offers in terms of sensitive data, supply lines and connections to multiple organizations that attract attacks
Read More
PARTICIPATE NOW |
|