One cybersecurity firm has used secondary research to recommend prevention, security-first culture, and partnerships with cyber experts and insurers as remedies In referencing various reports* on the ...
2024 marked the year AI took center stage, and the momentum is stomping its way into 2025 as certainly as taxes are here to stay! With the increasing sophistication fueled by AI, the payment sector is ...
With AI, especially generative AI – the latest being China-developed DeepSeek – hogging the headlines in tech news across the region, what does that spell the cyberthreat landscape in Southeast Asia?
Solutions architects create the overall technical vision for specific solutions to a business problem, in this case, defending against cybersecurity threats As the new year begins, we continue ...
OT security concerns peaking, AI integration trend growing. Palo Alto Networks recently released findings from the State of Cybersecurity in ASEAN 2023 research. The study covers cybersecurity data, ...
Cybersecurity leads boardroom agendas among ASEAN organizations in light of pandemic-induced shifts. Palo Alto Networks has released new research into businesses’ attitudes towards cybersecurity ...
The basic tips are probably just the tip of the agency’s cyber-warfare-arsenal iceberg, but state-sponsored actors are equal-opportunity champions too When a spy agency tells smartphone owners to be ...
The technology landscape in 2025 promises to be of significant breakthroughs and opportunities. From the rapid growth of AI to the pressing need for sustainability and robust cybersecurity measures, ...
Here are the cyber predictions for 2025 that should spur the world to collaborate more — to share cyber intelligence and resources The digital environment is not isolated; it runs parallel to the ...
At least this is what one cybersecurity firm suspects of a new ransomware group emerging in Dec 2024… A ransomware group that had first emerged late last year has rapidly gained prominence by ...
Most people understand deepfake technology through the lens of fun apps that allow users to prank friends by swapping or modifying faces in photos. However, when such visual tools are used for faking ...
Amid a global landscape of political and economic turbulence, talent shortages and escalating cyberattack/espionage sophistication, four axioms of cybersecurity remain perennial In the past year, ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results