<
>

Computer Security Day - Tips from Synopsys

by Boris Cipot, Senior Security Engineer, Synopsys Software Integrity Group Taking a moment on this Computer Security Day to express gratitude to the individuals dedicated to daily risk mitigation in order to make our...

Threat Predictions for 2024: Chained AI and CaaS Operations Give Attackers More “Easy” Buttons Than Ever

by Derek Manky, Global VP Threat Intelligence Fortinet With the growth of Cybercrime-as-a-Service (CaaS) operations and the advent of generative AI, threat actors have more “easy” buttons at their fingertips to...

Exploring the Future Of IoT: Challenges And Opportunities

by Miri Ofir, Research and Development Director at Check Point Software; and Gili Yankovitch, Technology Leader at Check Point Software   What Does The Global Threat Landscape Look Like And Could You Share...

Back to Basics: Revisiting IT Fundamentals for Secure Operations

by Lindsay Brown, Vice President and General Manager, Asia Pacific and Japan at GoTo It’s fair to say many businesses, especially so as small business owners or business leaders in small and medium-sized...

Keeping Yourself Safe Online Beyond Cybersecurity Awareness Month

by Sandra Lee, Senior Director, Sales - Greater China, ASEAN, Korea, Sophos   While October was global Cybersecurity Awareness Month to raise awareness for the importance of protecting ourselves and our businesses...

Data Management and Security Are Key To Malaysia’s Digital Transformation Plans

by Sandy Woo, Country Director, Veritas Technologies Malaysia   The pressure is on governments everywhere to invest in science and technology as people demand more efficiency and better quality public services –...

CybeReady Provides Free Employee Training to Tackle Cyber Risks in Conflict Zones

by Friday Chua, Founder and CEO of CiMS Tech   In early 2023, Malaysia had a total of 44.05 million active cellular mobile connections and counting. Clearly, digital communication has become an integral part of...

The Tangible Impacts of Invisible Threats: Cyber Attacks On The Critical Infrastructure Sector

by Gary Gardiner, Head of Security Engineering, APAC, Check Point Software Technologies In today's interconnected world, the threat of cyber attacks on critical infrastructure (CI) is no longer just a possibility...

How to Empower DevSecOps in a Complex Multi-Cloud Landscape

by Raj Rajamani, Chief Product Officer, DICE at CrowdStrike   Our customers are embracing cloud-based application delivery for speed of delivery and scale.  However, the proliferation of multi-cloud systems to access...

The Financial Implications of Cyber Security: How Catch Rates Impact Organisational Risk

by Keely Wilkins, Office of the CTO, Check Point Software Technologies Despite its countless benefits, the internet can be a hostile place for business. As organisations continue to expand their digital footprints, moving...