Why backups alone can’t protect your data
PAM reduces risks to backup environments by restricting access, monitoring activity, and supporting recovery from cyberthreats.
5 keys to securing business critical applications
The age of digital transformation is upon us. Cloud, virtualisation and containerisation are becoming mainstream. With all of the buzzwords and technology hype, it is easy to forget the real business drivers behind this...
How the manufacturing industry can protect itself in a digital world
In the 1936 American
comedy film Modern Times starring Charlie Chaplin, his onscreen persona
Little Tramp struggles to stay afloat in a modernizing, industrial world. The
scene in which he tries to keep up with the assembly...
13 email threats you need to know about right now
Cybercrime continues to rank as a top risk for businesses of all sizes in Asia and across the globe, costing organisations in ASEAN a whopping S$3.6 million (US$2.62 million) on average per breach, according...
Safer, simpler and stronger authentication in the New Normal
About 15 years ago, Bill Gates said when he spoke to an audience at a cybersecurity conference in San Francisco that passwords cannot meet the challenge of keeping critical information secure.
Fast forward to today,...
The future of work is anywhere and everywhere
The challenge presented by Covid-19 has been as significant a global social and economic shock as there has been in living memory. It is not clear when and how we will return to “normal”,...
Powering Singapore’s healthcare with hybrid cloud
The Covid-19 pandemic hasn’t just put healthcare providers at the centre of public consciousness; it has also highlighted the pressing need for digital transformation in the sector, pushing digital health technologies such as telehealth...
When migrating to the cloud, where should companies in Asia Pacific focus their data...
For many organisations in the Asia Pacific, creating an effective data protection strategy to support the adoption of remote work and cloud infrastructure is becoming increasingly urgent. In the APAC region, IDC projects that...
The government role in driving digital resilience for a thriving digital economy
Two things that everyone has learned during the ongoing pandemic recovery is 1) consumers, citizens and customers are completely reliant for organizations to be always-on, and 2) data truly is a primary ‘digital asset’...
Coming together to tackle phishing for the greater good
Phishing is one of the oldest cyber attack techniques, dating back to the 1990s. Even today, this technique continues to evolve as scammers come up with new and sophisticated ways to steal user data...