Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
AI disinformation campaigns surge in US/Israel-Iran war
DESILO and FHE Inventor Craig Gentry Introduce 5th-Generation “G...
Asia Pacific Cyber Safety Landscape 2026
2026 State of Security and Identity Report
How escalating geopolitical tensions are expanding the cybersecurity f...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Beyond firewalls – addressing cybersecurity blind spots

      Beyond firewalls – addressing cybersecurity blind spots

      Monday, March 2, 2026, 10:24 AM Asia/Singapore | Features
    • Featured

      Where are financial fraud and AML regulations heading in S E Asia?

      Where are financial fraud and AML regulations heading in S E Asia?

      Tuesday, February 10, 2026, 2:44 PM Asia/Singapore | Features
    • Featured

      How AI is reshaping dating in Asia

      How AI is reshaping dating in Asia

      Monday, February 9, 2026, 5:33 AM Asia/Singapore | Features, Newsletter
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

Tips

Securing the AI ecosystem: The next frontier for APAC enterprises

By Kevin O’Leary, Head of Security & Resiliency and Network & Edge, Kyndryl ASEAN | Friday, December 12, 2025, 6:35 AM Asia/Singapore

Securing the AI ecosystem: The next frontier for APAC enterprises

AI adoption has reached an inflection point in enterprise infrastructure, and securing the AI ecosystem is now the new cybersecurity frontier for organizations.

Just as virtualization transformed compute and cloud-redefined networks, AI is now woven into the fabric of enterprise systems.

Yet this rapid integration has created a new class of vulnerabilities across AI infrastructure – spanning models, data pipelines, and orchestration environments. Each component, if unprotected, can become a potential entry point for compromise, demanding a fresh approach to resilience and governance.

Kyndryl’s 2025 Readiness Report underscores the urgency: only 31% of organizations globally say they are “completely ready” to manage external business risks. Even more concerning, 60% of leaders admit they struggle to keep pace with the velocity of technological change.

This readiness gap exposes enterprises to cascading risks — not only from traditional cyberthreats, but from AI-assisted attacks that can adapt, learn, and automate compromise at scale.

The AI-enabled threat landscape

The security community has long accepted that automation benefits both sides of the battlefield. Threat actors are now integrating LLM-driven reconnaissance, adaptive phishing, and model-based intrusion techniques into their toolkits. Adversaries can generate polymorphic malware, automate vulnerability discovery, and even manipulate datasets to evade detection.

Across APAC, Kyndryl and industry partners have observed the emergence of AI-assisted “campaign frameworks” — reusable malicious models capable of generating spear-phishing content, modifying payloads in real time, and orchestrating multi-stage attacks without human intervention.

For defenders, the response must be equally algorithmic. Security operations centers (SOCs) are beginning to integrate AI-driven telemetry correlation, drift detection, and automated containment into their pipelines. However, securing AI itself — the models, training data, inference APIs, and orchestration systems — remains an unfilled gap in most organizations’ architectures.

From compliance to continuous assurance

Securing AI cannot rely on legacy compliance frameworks. Enterprises must embed secure-by-design principles throughout the AI lifecycle — Singapore’s Guidelines on Securing AI Systems (2024) from data acquisition to model decommissioning offer a globally relevant framework that technical leaders across APAC can adapt.

At a minimum, organizations should operationalize six lifecycle controls:

  1. Ownership and Risk Profiling: Assign accountable owners for every model, classify risk by data sensitivity and criticality.
  2. Data & Model Hygiene: Apply encryption, enforce separation between training and production, implement access controls at dataset and model layers.
  3. Adversarial Testing: Conduct “red team” simulations to detect model poisoning, prompt injection, or bias exploitation.
  4. Visibility and Bill of Materials: Maintain a model and software bill of materials (MBOM/SBOM) to trace every dependency and library version.
  5. Runtime Observability: Log inference requests and outputs, monitor anomalies, and flag deviations in model behavior.
  6. Incident Response and Retirement: Integrate AI systems into existing IR playbooks and securely decommission outdated models.

These practices shift AI security from a compliance checklist to an engineering discipline — one grounded in visibility, automation, and iterative assurance.

APAC’s distinct challenge: hybrid complexity

For APAC enterprises, securing AI is further complicated by hybrid architectures. Organizations in Singapore, Malaysia, Indonesia, and the Philippines commonly operate multi-cloud and edge deployments across jurisdictions with varying data sovereignty rules. According to Kyndryl’s Readiness Report, 44% of global leaders are reevaluating data-governance policies, 41% are considering data repatriation, and 65% of organizations have made changes to their cloud strategies in response to new geopolitical pressures.

Each of these shifts expands the AI threat surface: training data stored across jurisdictions, models deployed on the edge, and vendors integrated into supply chains. The result is a mesh of interdependent risks that require consistent governance frameworks and real-time telemetry correlation.

To close these gaps, enterprises must invest in end-to-end observability that connects cloud workloads, data pipelines, and AI endpoints for real-time correlation. Security and governance policies should be codified through Infrastructure as Code and ModelOps, ensuring consistency across hybrid environments. At the same time, zero-trust principles must extend to model APIs and inference layers, while AI-specific threat-intelligence sharing across industries and regions becomes essential to anticipate emerging exploits.

Cyber resilience as a board and engineering imperative

The CISO’s remit is expanding beyond data protection to include model integrity and algorithmic reliability. Modern incident-response plans must now account for scenarios like model drift, prompt leakage, or training-data compromise. The metrics of resilience are evolving, too — from MTTR (Mean Time to Recovery) for systems to MTTM (Mean Time to Mitigate) for AI incidents.

As Singapore’s recent breach of critical infrastructure revealed, cyber resilience must integrate governance, engineering, and operations. Technical teams should partner with compliance, HR, and finance to conduct joint readiness drills — because AI incidents will not respect departmental silos.

The road ahead: building secure AI infrastructures

AI will be embedded into every layer of enterprise infrastructure — from network optimization to predictive maintenance. For APAC organizations, the imperative is clear: secure the models before they secure the market.

In a hyper-connected region defined by diverse regulatory environments and fast-moving digital ecosystems, resilience depends on engineering discipline. The frontier of cybersecurity is no longer just the perimeter or supply chain — it is the model layer itself.

Enterprises that catalog, test, monitor, and govern their AI assets as rigorously as their codebases will be the ones that thrive. Because in the age of intelligent automation, the only sustainable advantage is secure intelligence.

Share:

PreviousFescaro sees rising demand for automotive cybersecurity solutions
NextJust when we thought AI-powered IDEs were invaluable…

Related Posts

Data management and protection in the WFH multi-cloud era

Data management and protection in the WFH multi-cloud era

Friday, September 4, 2020

AI model o3 defies shutdown commands autonomously, with code tampering

AI model o3 defies shutdown commands autonomously, with code tampering

Monday, June 2, 2025

Did cyber risk levels in APAC organizations improve in H2 last year?

Did cyber risk levels in APAC organizations improve in H2 last year?

Tuesday, July 11, 2023

Lazarus APT dives into big-game hunting, operates own ransomware

Lazarus APT dives into big-game hunting, operates own ransomware

Thursday, July 30, 2020

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • Cyber protection for medical clinics in Singapore

    Cyber protection for medical clinics in Singapore

    As Singapore’s healthcare sector becomes increasingly digital and interconnected, clinics are facing heightened cyber risks, …Read more
  • India’s WazirX strengthens governance and digital asset security

    India’s WazirX strengthens governance and digital asset security

    Revamping its custody infrastructure using multi‑party computation tools has improved operational resilience and institutional‑grade safeguardsRead more
  • Bangladesh LGED modernizes communication while addressing data security concerns

    Bangladesh LGED modernizes communication while addressing data security concerns

    To meet emerging data localization/privacy regulations, the government engineering agency deploys a secure, unified digital …Read more
  • What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    This case study examines how many anti-fraud professionals reported feeling underprepared to counter rising AI-driven …Read more

Bottom sidebar

Other News

  • DESILO and FHE Inventor Craig Gentry Introduce 5th-Generation “GL” FHE Scheme for Private AI

    Monday, March 9, 2026
    Debuting at the FHE.org 2026 …Read More »
  • DoveRunner Expands Presence in Southeast Asia with New Office in Jakarta

    Thursday, February 26, 2026
    JAKARTA, Indonesia, Feb. 25, 2026 …Read More »
  • Proofpoint partners with Concentrix to strengthen human- and agent-centric cybersecurity across Asia Pacific

    Tuesday, February 24, 2026
    Partnership integrates Proofpoint’s collaboration and …Read More »
  • Indonesia’s MDI Ventures Doubles Down on Execution and Trust to Unlock Regional Portfolio Value

    Friday, February 20, 2026
    The Telkom-backed VC reinforces cross-sector …Read More »
  • Blackpanda Japan Announces Strategic Partnership with SoftBank to Strengthen Cyber Incident Response in Japan

    Wednesday, February 11, 2026
    SINGAPORE, Feb. 10, 2026 /PRNewswire/ …Read More »
  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2026 CybersecAsia All Rights Reserved.