Cyberattackers in the Asia Pacific region have become increasingly smarter with the advent of generative AI. As large language models are integrated into consumer-facing products, the threat surface for cyberattackers has also expanded. However, generative AI also offers specialised capabilities to more efficiently counter the evolving threats posed by malevolent actors. In 2023, cyberattackers used […]
Resource Types
Overcoming challenges in multi-cloud compliance
Cloud compliance simply means that a business’ cloud-delivered system has to be compliant with the standards required by the end users or customers. Cloud technology remains the linchpin of today’s accelerated digital transformation strategies in the Asia-Pacific region. With the introduction of new technologies like generative AI, legacy infrastructure becomes unsustainable in a world driven […]
How to boost your cybersecurity hygiene with best practices
Establishing robust cybersecurity hygiene through the continuous improvement of your organisation’s security posture is critical in mitigating the risks of data breaches, operational disruptions, and reputational harm. A strong security stance is pivotal in countering emerging threats and effectively neutralising existing ones. This is even more critical as businesses continue to invest in new technologies […]
“Think Like a Hacker” to Enhance Security Posture
The frequency of ransomware attacks shows no signs of relenting in 2023. If anything, ransomware attack techniques are evolving and becoming increasingly elusive. This evolution renders common endpoint solutions inadequate to counteract these attacks. How do you define a strong security posture? It is not unusual for most digitally modernised organisations to have thousands of […]
SASE and ZTNA Vendor Comparison: Navigating Your Choices
Choosing the right vendor to implement Secure Access Service Edge (SASE) and Zero Trust Network Access (ZTNA) solutions is a critical decision for network security administrators. Each vendor brings its own unique set of features, capabilities, and pricing structures. This article aims to provide an overview of the key factors to consider when evaluating vendors, […]
The Future of Network Security: SASE, ZTNA, or Both?
Navigating the dynamic landscape of network security can be a complex task. Secure Access Service Edge (SASE) and Zero Trust Network Access (ZTNA) are the two models that have emerged as frontrunners in the realm of network security. But what does the future hold for these models? Will one surpass the other, or will they […]