<
>

Earth Day 2024: Securing Our Earth

by Maya Yarowsky, ESG Manager, Check Point Software Technologies Cyber security solutions are the silent safeguard of our society, ensuring the smooth operation of economies, businesses, and critical infrastructure that...

Is the Cybersecurity Talent Crunch Finally Taking Its Toll?

by Sandeep Bhargava, SVP, Global Services and Solutions, Public Cloud Business Unit, Rackspace Technology In today’s digital era, cybersecurity mirrors a high-stakes chess game. The evolving landscape forces...

The Rising Threat of Search Engine Ad Abuse

by Sumit Bansal, VP, Asia Pacific & Japan, BlueVoyant A new report from BlueVoyant finds that threat actors are using the ad infrastructure built into search engines to their advantage to phish unsuspecting users. The...

Fortifying The Future of Cybersecurity

by Foo Siang-tse, Senior Partner, Cyber, NCS   It seems like there are new scam cases reported in Singapore every other day, with even digital-savvy professionals falling prey and others losing their life savings. Scammers...

How Asia Pacific Organisations Can Better Navigate AI-Powered Threats, Data Privacy and Supply Chain Security Challenges In 2024

by Michal Lewy Harush, CIO, Aqua Security Looking further into the year 2024, Moshe Weis, CISO, Aqua Security identified three major threats that will continue to be top of mind for security teams globally and in the...

AI-Generated Code: The Fourth Component Of Software

by Jim Ivers, Vice President, Marketing, Synopsys Software Integrity Group There is enormous attention on generative AI (GenAI) and its potential to change software development. While the full impact of GenAI is yet to be...

Microsoft Copilot For Security Is Generally Available On April 1, 2024, With New Capabilities

by Vasu Jakkal, Corporate Vice President, Security, Compliance, Identity, and Management, Microsoft Today, we are excited to announce that Microsoft Copilot for Security will be generally available worldwide on April 1. The...

Beware Of Zombie Code in Your Open-Source

by Fred Bals, senior software security technical writer and researcher within the Synopsys Cybersecurity Research Centre (CyRC) Highlighting the critical need for improved maintenance practices among users of open source...

Ping Identity Leadership Predicts the 2024 Global Identity Landscape

by Jasie Fon, Regional Vice President of Asia, Ping Identity As the digital becomes ever more entwined in our daily lives, identity security has had to swim with the tide amid rapidly evolving threats. This year,...

The Future of Authentication: Are You Embracing Biometrics?

by Katie Björk, Director of Communications and Solution Marketing, Identity and Access Management, HID and Vito Fabbrizio, Managing Director, Biometrics, Extended Access Technologies, HID. Growing demand for enhanced...