• Skip to primary navigation
  • Skip to main content
Lumen APAC

Lumen APAC

Transformation just got a lot easier

  • Services
    • Security
    • Network
    • Edge Cloud
    • Managed & Professional Services
  • Customer Stories
  • About Lumen
  • English
    • English

Blog Articles

The latest industry news, interview, technologies, and recources

  • View All
  • Edge Cloud
  • Managed & Professional Services
  • Network
  • Press Release
  • Security
Loader

Network

Scaling Success in India: Navigating Network Challenges in a Rapidly Growing Market

As a CIO or Network Director, you’re responsible for keeping your enterprise connected, secure, and always primed for growth. But…

Network

Scaling Success in India: Navigating Network Challenges in a Rapidly Growing Market

As a CIO or Network Director, you’re responsible for keeping your enterprise connected, secure, and…

Security

How do organisations in Asia Pacific tackle vulnerability management?

In 2024, we have seen the impacts of cyberattacks on many organisations largely around data…

Security

MDR vs IR: Taking the best approach for your organisation

Organisations are now facing a growing range of threats amidst a rapidly changing technological landscape….

Security

End-to-End Supply Chain Risk Management: Implementing Effective Strategies

Organisations in Asia-Pacific (APAC) today largely outsource and integrate their IT systems with that of…

Press Release

Lumen Technologies Helps Enterprises See More, Stop More – Achieving Business Resilience Through A Proactive Cybersecurity Approach

Expands its latest Advanced Managed Detection & Response (Advanced MDR) service offerings, going beyond the…

Security

Stay ahead of the curve by investing in cybersecurity

Organisations across Asia Pacific (APAC) are facing challenges in maintaining relevant capabilities in cybersecurity not…

Security

Quarter by Quarter. Threat by Threat. Lumen Q4 DDoS & Application Threat Report Understand the…

Security

What are the cybersecurity hot takes for 2024?

Cyberattackers in the Asia Pacific region have become increasingly smarter with the advent of generative…

Security

Overcoming challenges in multi-cloud compliance

Cloud compliance simply means that a business’ cloud-delivered system has to be compliant with the…

Security

How to boost your cybersecurity hygiene with best practices

Establishing robust cybersecurity hygiene through the continuous improvement of your organisation’s security posture is critical…

Security

“Think Like a Hacker” to Enhance Security Posture

The frequency of ransomware attacks shows no signs of relenting in 2023. If anything, ransomware…

Network

SASE and ZTNA Vendor Comparison: Navigating Your Choices

Choosing the right vendor to implement Secure Access Service Edge (SASE) and Zero Trust Network…

Network

The Future of Network Security: SASE, ZTNA, or Both?

Navigating the dynamic landscape of network security can be a complex task. Secure Access Service…

Network

Evaluating Your Business Needs: SASE vs. ZTNA

As a Network Security Administrator, choosing between Secure Access Service Edge (SASE) and Zero Trust…

Network

Understanding SASE and ZTNA

In the rapidly evolving digital landscape, choosing the right network security model can be a…

Security

Supply Chain Cybersecurity and Regulatory Compliance

As the digital age continues to evolve, supply chains are becoming increasingly complex and intertwined….

Security

Supply Chain Cybersecurity: Human Factors

As a supply chain manager, you are undoubtedly aware that cybersecurity is a critical aspect…

Security

The Role of Technology in Supply Chain Cybersecurity

In an interconnected world, the supply chain has become a crucial hub of business operations….

Security

Implementing a Supply Chain Cybersecurity Strategy

Securing your supply chain from cyber threats is no longer an optional task – it’s…

Security

Understanding Supply Chain Cybersecurity

In the interconnected world of digital commerce, supply chain security has become an increasingly critical…

Network

Strategies for Successful Digital Innovation: A Comprehensive Guide for Business Growth

Digital innovation is no longer a buzzword—it’s a crucial strategic pillar for modern businesses aiming…

Security

Digital Innovation: The Role of Cybersecurity in Accelerating Business Growth

In the modern business landscape, digital innovation is not just a strategy; it’s a necessity….

Network

The Impact of AI on Network Transformation: A Guide for Digital Transformation Officers

In the era of rapid digitalisation, Artificial Intelligence (AI) has become a key player in…

Security

Cybersecurity 101: Understanding the Basics – A Guide for CISOs

As the digital landscape expands, cybersecurity has become an inescapable concern for businesses. Protecting your…

Network

Future-Proofing Your SASE Deployment: The Pathway to Sustainable Network Efficiency and Security

In an era defined by digital transformation, Secure Access Service Edge (SASE) has become a…

Edge Cloud

Challenges in SASE Deployment and How to Avoid Them: A Guide for Network Architects

As the prominence of Secure Access Service Edge (SASE) grows, so does the need for…

Edge Cloud

The Role of IT in SASE Deployment: Guiding Network Architects

In the rapidly evolving world of network architecture, Secure Access Service Edge (SASE) stands as…

Edge Cloud

Successful SASE Deployment: A Comprehensive Guide for Network Architects

The emergence of Secure Access Service Edge (SASE) has transformed the network security landscape, promising…

Edge Cloud

The Future of Data Storage: Cloud, On-Premise, or Hybrid?

As the world becomes increasingly digital, the importance of effective and efficient data storage solutions…

Edge Cloud

Hybrid Cloud Solutions: Best of Both Worlds

For businesses grappling with the decision between cloud and on-premise solutions, a hybrid solution might…

Edge Cloud

Making the Decision: Cloud vs On-Premise Solutions

As an IT strategist, one of the key decisions you may need to make is…

Managed & Professional Services

Understanding S/4HANA Cloud

In the complex landscape of ERP solutions, SAP’s S/4HANA Cloud emerges as a leading choice…

Security

The Future of the Human Firewall

As the digital landscape continues to evolve, the concept of the human firewall becomes increasingly…

Security

Human Firewall: Threats and Risks

The concept of the human firewall places employees at the forefront of a company’s cybersecurity…

Security

The Role of Culture in the Human Firewall

Culture is an integral part of any organisation, and when it comes to cybersecurity, it…

Security

Training the Human Firewall

Training employees to serve as a human firewall is one of the most effective strategies…

Edge Cloud

Cloud Security: Navigating Compliance and Regulatory Challenges

In the world of cloud security, Cloud Security Officers understand that compliance with regulations is…

Edge Cloud

Best Practices to Mitigate Cloud Security Risks: A Comprehensive Guide

Cloud Security Officers today face an increasingly challenging landscape filled with evolving threats and complexity….

Edge Cloud

Top Cloud Security Risks: A Guide to Navigating the Cloud Safely

As businesses continue their digital transformations and adopt cloud technologies, the task of maintaining secure…

Security

Cybersecurity: The last line of defence isn’t what you think

As businesses digitalise their processes and operations, the likelihood of cybersecurity incidents is poised to…

Edge Cloud

The Role of Employees in Cloud Security: A Vital Human Element

Cloud Security Officers understand that technology and policies are just one part of the security…

Managed & Professional Services

The Future of ERP: RISE with SAP, S/4HANA Cloud, or Both?

The enterprise resource planning (ERP) landscape is continually evolving, and businesses need to stay informed…

Managed & Professional Services

Implementing RISE with SAP or S/4HANA Cloud

Choosing an ERP solution is a major decision for businesses. Once that choice is made,…

Managed & Professional Services

Comparing RISE with SAP and S/4HANA Cloud

Deciding on an ERP solution is a critical decision for any organisation. Two leading choices…

Managed & Professional Services

Understanding RISE with SAP

Navigating the landscape of Enterprise Resource Planning (ERP) solutions can be a daunting task. Today,…

Network

Steps to Deploy SASE: A Guideline for Network Architects

Secure Access Service Edge (SASE) has quickly become a buzzword in the realm of network…

Network

Comparing SASE Providers: A Guide for IT Managers

In the modern digital landscape, Secure Access Service Edge (SASE) is making waves by simplifying…

Network

Implementing SASE in Your Business: A Comprehensive Guide for IT Managers

The shift to Secure Access Service Edge (SASE) can transform your network security, simplify complexities,…

Network

The Evolution of Network Security: Pre-SASE and Post-SASE

The world of network security is in constant evolution, with new advancements shaping the landscape….

Network

SASE and its Impacts on Businesses: A Comprehensive Breakdown for IT Managers

As the digital world continues to evolve, business landscapes are being reshaped by new and…

Network

The Core Components of SASE: Simplified Network Security for IT Managers

The world of information technology is in constant flux, and as an IT manager, understanding…

Security

Knows and Hows of Implementing a Third-Party Firewall

In today’s digital world, network security is one of the most critical factors that determine…

Network

SASE vs ZTNA: Which one is right for you?

Hybrid working, rapid cloud adoption, and the rising usage of third-party software have raised cybersecurity…

Edge Cloud

Mitigating Cloud Security Risks

Cloud computing has become an essential part of modern business, offering agility, scalability, and cost-efficiency….

Edge Cloud

A digital transformation blueprint for enterprises in Asia Pacific GET THE WHITE PAPER → Here’s…

Security

Managing Supply Chain Cybersecurity Risk

Cybersecurity risks are real. As demonstrated by recent security breaches, the threats can only increase,…

Security

Lumen Technologies Partners with KnowBe4 to Address Growing Need for Cybersecurity Awareness in APAC Organisations

New Managed Security Awareness Service will help strengthen ‘human firewalls’ in organisations by training and…

Edge Cloud

Understanding the Well-Architected Framework for your Cloud

The Well-Architected Framework is a methodology developed by the cloud providers to help businesses build…

Security

2023 Phishing By Industry Benchmarking Report Find out how you are doing as compared to…

Edge Cloud

Lumen Technologies Partner with Orca Security for Comprehensive Solution to Manage Cloud Threats in Asia Pacific

Orca Security provides a single cloud security platform to unify cloud risk management, eliminating the…

Security

Why strong governance is key to protecting your organisation

Data privacy and protection of personal information – it’s something we know matters, but we…

Network

Understand SASE in under 4 minutes

In the realm of modern-day networking and cloud computing, there is a solution that has…

Managed & Professional Services

SAP S/4HANA migration – partnering for success

December 31, 2027 is when SAP is officially ending mainstream maintenance for the customers of…

Edge Cloud

How SASE solves five key pain points for CIOs

Hybrid working and the proliferation of cloud-based applications create five key network security pain points…

Edge Cloud

How to Optimise Your Edge Strategy with SD-WAN

It’s increasingly clear that edge computing is now centre-stage for forward-looking organisations considering their digital strategies. According…

Edge Cloud

How to accelerate digital innovation: ‘Transform, Simplify, Secure’ is key

Since 2021, leading businesses in Asia Pacific (APAC) have been undertaking digital transformation projects at…

Security

AI Web Apps: Boon or Bane?

It’s only recently that the world started seeing the tangible outcomes of Artificial Intelligence (AI)…

Security

Cybersecurity risks that you need to know and manage

3 technology and process security risks that you need to manage Some technologies and common…

Security

Cyber Resiliency in Australia – A call for action

In recent days, there has been so much news about data breaches and cyberattacks. One…

Security

How people cause most cybersecurity challenges in APAC

Most businesses in the APAC region have experienced at least one cyberattack from January to…

Network

How to deploy SASE: Key points to remember

We explored the common pain points that SASE solves and its key use cases.  Once…

Network

How Next-Generation Technologies Are Powering Digital Transformation GET THE REPORT → Learn how IT leaders…

Security

Cybersecurity predictions you need to know for 2022

As we emerge from the shadows of pandemic, we realize that the pandemic has created…

Security

MSSPs are emerging as critical partners for organisations in the digital-first era. Here’s why

Following the rapid digitalisation of the last decade, organisations worldwide, including those in the Asia/Pacific…

Security

How to improve your organisation’s security posture: The essentials

With the rapid pace of digitalisation and distributed workforce, many companies in Asia Pacific struggle…

Edge Cloud

Now or Never – Building resilience amidst the pandemic

It is impossible to overstate how significantly the COVID-19 pandemic has impacted companies of all…

Network

6 steps to simplify your SASE journey

SASE refers to a convergence of network and security platforms that creates a secure edge…

Security

Why Double-Extortion Attacks Might Be the Biggest Threat To your Business Yet

The threat from ransomware – and the money cybercriminals are making – has never been…

Edge Cloud

5 steps to multi-cloud for the 4th industrial revolution

In 2020, work environments changed significantly. The COVID-19 pandemic was both unanticipated and disruptive, and…

Network

Lumen Named a Leader in Gartner’s Network Services Magic Quadrant 2021

In 2020, work environments changed significantly. The COVID-19 pandemic was both unanticipated and disruptive, and…

Security

With Lumen, the future of next-gen business is limitless

“In life, change is inevitable. In business, change is vital.– Warren G. Bennis The last…

Edge Cloud

The Edge Opportunity: Opening up a new revenue source that sticks to the network

Enterprises Look to Edge Computing to Accelerate Business Developments in artificial intelligence, analytics, and robotics…

Edge Cloud

Post Pandemic Priorities Bring Edge Services to the Forefront

As the South East Asian economies emerge from the lockdowns, there are some lessons from…

Edge Cloud

What You Need to Know About Digital Transformation with a Managed Service Provider

Table of Contents  Introduction  What is digital transformation? Why should digital transformation solutions be a…

Edge Cloud

How Edge Computing is Transforming Data Center Strategies

It is no secret that centralized data centers and their roles are transforming rapidly across…

Questions? Let’s talk.

Contact our team and get answers you’re looking for.

Contact Us

Lumen is unleashing the world’s digital potential. We ignite business growth by connecting people, data, and applications – quickly, securely, and effortlessly. As the trusted network for AI, Lumen uses the scale of our network to help companies realize AI’s full potential. From metro connectivity to long-haul data transport to our edge cloud, security, managed service, and digital platform capabilities, we meet our customers’ needs today and as they build for tomorrow.

© 2025 Lumen Technologies. All Rights Reserved.

Legal
Lumen Privacy Notice
Press enter/return to begin your search