We love our apps, but can we trust them?

Apps augment our lifestyles and enhance the way we live and work. We use them every day across platforms and devices, and we may even love some of these apps. There is little question that apps have...

5 cloud security know-hows

Cloud computing has been woven into the fabric of many businesses’ network infrastructure today, enabling businesses to access software on the Internet as a service, and safely store and share data. By allowing employees to access network...

How mobile technology is driving the evolution of physical cards

Enabled by high smartphone penetration, advancements in payments solutions and Smart Nation initiatives, consumers and businesses across Asia Pacific are embracing cashless payments. Going cashless also paves the way for countries to transition from...

Open Banking in a post-COVID19 world

As the world collectively ponders on how COVID19 will create a new normal, industry luminary Chris Skinner has already dished out some great insights on his blog The Finanser. One of his articles directs...

Who is responsible for data privacy at the end of the day?

The emergence of digital technologies over the last decade has led to the exponential growth of our digital footprints. Back in 2017, research firm Gartner predicted that more than 20 billion IoT devices will...

Compliance and cash flow optimisation find new importance during the pandemic

The pandemic has imposed a new challenge on tax management from a compliance perspective. As a form of relief to businesses, many APAC markets, including Australia, China, India, Indonesia, Japan, Malaysia, Philippines, New Zealand,...

Unravelling the mystery of the school IT help desk

As many countries around the world continue to navigate the current economic landscape, there’s an increasing consideration in the region to implement remote or distance learning into the education curriculum. However, the move to...

The hybrid workplace is here to stay – so let’s make sure it’s secure

As Singapore shifts to living with an endemic COVID-19 and workplace restrictions ease, we will see half-empty offices and deserted business districts opening up to welcome returning workers. This may seem like the first...

Three strategies for cybersecurity in the long term

The last year has presented new and complex challenges for businesses as they shifted their technology infrastructure to support an "everywhere workplace”. As enterprises continue to invest in digital transformation, more risk is generated inevitably,...

How enterprises can show the ROI of their security programmes

How can the value of security or security effectiveness be measured within an organisation? This discussion explores several ways.
- Advertisement -

FEATURES

Confluent’s blueprint: From data chaos to clarity

Here’s how Confluent deals with complex data infrastructures, promoting better integration and efficiency in enterprise systems.

OPINION