OT security concerns peaking, AI integration trend growing. Palo Alto Networks recently released findings from the State of Cybersecurity in ASEAN 2023 research. The study covers cybersecurity data, ...
Gartner ® has positioned Fortinet highest for Ability to Execute for the fourth year in a row. And, for the fifth straight year, we’ve been named a Leader in the Magic Quadrant ™ for SD-WAN. We ...
Find out how organizations can leverage transformative technologies such as AI, machine learning while mitigating cyber risks. The operational technology (OT) landscape is rapidly evolving with the ...
Through constant joint information sharing and pre-emptive defense groupthink, the financial services industry is uniting to diffuse data-theft fallout. In late 2020, cybersecurity firm Checkpoint ...
Leadership discussions are going beyond business continuity and surviving the pandemic, to focus more on resilience, security and safety for the future. It’s no longer news that the COVID-19 pandemic ...
Just as IoT and API vulnerabilities were predicted but slow to be addressed, EV infrastructure cyber threats need addressing now While the ecological benefits of electric vehicles (EVs) are undeniable ...
According to Forescout’s recent Rough Around the Edges report, there are 22 million exposed OT devices in the ASEAN region alone – 21% more than two years ago. In ASEAN,Singapore has the highest ...
Hacker mindset: why exfiltrate or hijack data to inflict damage when manipulating the data can cause even more severe harm? Every day, we hear about the new “innovative” ways that hackers use to ...
With the corporate perimeter now vastly broadened by remote-working, organizations may need to consider unifying this crucial cybersecurity process … While there are obvious benefits to a distributed ...
Cybersecurity leads boardroom agendas among ASEAN organizations in light of pandemic-induced shifts. Palo Alto Networks has released new research into businesses’ attitudes towards cybersecurity ...
Being benign hackers, their views and motivations may not exactly mirror those of state-sponsored threat actors, but let’s hear them out Based on an analysis of responses from 1,300 ethical hackers ...