Security

Malicious AI agents can severely disrupt APAC enterprises

Malicious AI agents can severely disrupt APAC enterprises

If an autonomous AI agent is given broad admin access, a malicious actor could hijack it to execute destructive actions.
May 19 2026 12:31PM
A data-first AI strategy is critical to managing security threats in 2026

A data-first AI strategy is critical to managing security threats in 2026

The challenge is not the tools we use, but the lack of visibility, as well as a governance model that is yet to catch up with AI adoption.
May 11 2026 10:54PM
Malicious AI inputs are creating a new and critical security threat

Malicious AI inputs are creating a new and critical security threat

Security leaders warn that prompt injection, agent misuse, and shadow AI are expanding risks as organisations start using AI.
May 7 2026 2:12PM
Beware the pitfalls of using a ‘DIY security’ approach

Beware the pitfalls of using a ‘DIY security’ approach

To bolster their security in 2026, companies should look first to simplification, and then smarter integration.
Mar 18 2026 12:56PM
AI transforms cyberattacks, but human trust remains the weakest link

AI transforms cyberattacks, but human trust remains the weakest link

Modern scams are increasingly targeting human judgement rather than technical vulnerabilities.
Mar 12 2026 8:19AM
How severe will ransomware attacks become in 2026?

How severe will ransomware attacks become in 2026?

Take heed - AI-fueled ransomware-as-a-service platforms may empower hackers to unleash polymorphic malware that mutates on the fly.
Jan 15 2026 11:22AM
Identity is now the new cybersecurity battlefield

Identity is now the new cybersecurity battlefield

Hackers in Asia Pacific are shifting towards URL-based threats as their go-to tactic.
Dec 5 2025 12:32PM
Why APAC organisations must rethink their cloud and AI security

Why APAC organisations must rethink their cloud and AI security

Many organisations here are still in the early stages of building their cloud strategy, at a time when identity-related risks are the leading cause of cloud breaches.
Nov 12 2025 12:56PM
Why is fragmentation the next big cybersecurity risk?

Why is fragmentation the next big cybersecurity risk?

While we can’t prevent every breach, we can try to absorb, contain, and recover from cyberattacks.
Nov 5 2025 6:29PM
The maritime sector is now in the crosshairs of cybercriminals

The maritime sector is now in the crosshairs of cybercriminals

Escalating cyber threats can cause massive financial losses, operational disruptions, and even safety risks.
Oct 30 2025 1:53PM
Malaysia secures communications for the upcoming ASEAN Summit

Malaysia secures communications for the upcoming ASEAN Summit

To protect people and data during high-level regional meetings.
Oct 22 2025 12:29PM
Ransomware gang Qilin claims attack on Japan’s Asahi breweries

Ransomware gang Qilin claims attack on Japan’s Asahi breweries

Orders, shipments and customer support affected as the company investigates.
Oct 8 2025 4:23PM
IMDA and Enterprise Singapore launch SME-focused cybersecurity initiative

IMDA and Enterprise Singapore launch SME-focused cybersecurity initiative

Free cybersecurity tools and workshops to strengthen small businesses.
Oct 8 2025 2:52PM
Cyberthreats are now targeting critical infrastructure on a larger scale

Cyberthreats are now targeting critical infrastructure on a larger scale

As digital and physical environments converge, is your IT and OT strong enough to stave off a sophisticated cyberattack?
Oct 7 2025 3:09PM
Gemini vulnerabilities threaten potential exposure of user data

Gemini vulnerabilities threaten potential exposure of user data

Flaws patched, but careful AI management remains essential.
Oct 1 2025 12:47PM
Best practice tips for secure password management

Best practice tips for secure password management

In today’s digital account-driven world, good password security is critical to making your business safer.
Sep 16 2025 7:14PM
Are third-party blind spots the weakest link in enterprise cybersecurity chain?

Are third-party blind spots the weakest link in enterprise cybersecurity chain?

Security practices have not kept pace with cloud adoption.
Sep 10 2025 2:33PM
Five tips a CIO or CSO should know to stop employee-driven IP theft

Five tips a CIO or CSO should know to stop employee-driven IP theft

Even the best cybersecurity systems can be outsmarted by a determined insider.
Aug 20 2025 12:24PM
StarHub launches app to protect customers from scam calls and SMS

StarHub launches app to protect customers from scam calls and SMS

Blocks fraudulent calls, filters spam texts, and updates scam database in real time.
Aug 18 2025 2:08PM