• Skip to primary navigation
  • Skip to main content
Lumen APAC

Lumen APAC

Transformation just got a lot easier

  • Services
    • Security
    • Network
    • Edge Cloud
    • Managed & Professional Services
  • Customer Stories
  • About Lumen
  • English
    • English

Blog

The Evolution of Network Security: Pre-SASE and Post-SASE

Managing Supply Chain Cybersecurity Risk

The world of network security is in constant evolution, with new advancements shaping the landscape. As an IT manager, understanding these changes can help you stay ahead and optimise your network’s security and performance. One of the biggest game-changers in recent times has been the emergence of Secure Access Service Edge (SASE). In this blog […]

SASE and its Impacts on Businesses: A Comprehensive Breakdown for IT Managers

Managing Supply Chain Cybersecurity Risk

As the digital world continues to evolve, business landscapes are being reshaped by new and emerging technologies. Secure Access Service Edge (SASE) is one such technology that is garnering attention for its transformative potential. But what impact does SASE have on businesses? For IT managers keen on simplifying complex network technologies and improving network security […]

The Core Components of SASE: Simplified Network Security for IT Managers

Managing Supply Chain Cybersecurity Risk

The world of information technology is in constant flux, and as an IT manager, understanding and staying ahead of new technologies is a crucial part of the job. One such technology that has been making waves in recent years is Secure Access Service Edge (SASE). Understanding SASE, however, can be daunting especially if network technologies […]

Mitigating Cloud Security Risks

Cloud computing has become an essential part of modern business, offering agility, scalability, and cost-efficiency. However, moving to the cloud also exposes your data and applications to various security threats, such as data breaches, unauthorised access, compliance violations, and performance issues.Furthermore, the extended cloud environment opens companies to the risks of data breaches, insider threats, […]

Managing Supply Chain Cybersecurity Risk

Managing Supply Chain Cybersecurity Risk

Cybersecurity risks are real. As demonstrated by recent security breaches, the threats can only increase, and exponentially, over the coming months and years. Be it in Singapore (Fullerton Health, October 2019), ANZ (Latitude, March 2023), Malaysia (Malaysian Airlines, March 2021), these security breaches are agnostic of industries affected, but do have one common factor. These […]

Understanding the Well-Architected Framework for your Cloud

Understanding-the-Well-Architected-Framework

The Well-Architected Framework is a methodology developed by the cloud providers to help businesses build and operate secure, high-performing, resilient, and efficient cloud-based infrastructure on the cloud. It is a set of best practices, guidelines, and tools that can be used to evaluate, design, and improve the architecture of cloud-based solutions. Well-Architected Framework is organised […]

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • Page 10
  • Page 11
  • Go to Next Page »

Lumen is unleashing the world’s digital potential. We ignite business growth by connecting people, data, and applications – quickly, securely, and effortlessly. As the trusted network for AI, Lumen uses the scale of our network to help companies realize AI’s full potential. From metro connectivity to long-haul data transport to our edge cloud, security, managed service, and digital platform capabilities, we meet our customers’ needs today and as they build for tomorrow.

© 2025 Lumen Technologies. All Rights Reserved.

Legal
Lumen Privacy Notice
Press enter/return to begin your search