Resources and Insights
The latest industry news, interview, technologies, and resources
Security
In 2024, we have seen the impacts of cyberattacks on…
Security
Organisations are now facing a growing range of threats amidst…
Security Enhancement
Organisations in Asia-Pacific (APAC) today largely outsource and integrate their…
Security
Organisations across Asia Pacific (APAC) are facing challenges in maintaining…
Cloud Security
Cyberattackers in the Asia Pacific region have become increasingly smarter…
Cloud Security
Cloud compliance simply means that a business’ cloud-delivered system has…
Security Enhancement
Establishing robust cybersecurity hygiene through the continuous improvement of your…
Security Enhancement
The frequency of ransomware attacks shows no signs of relenting…
Network Transformation
Choosing the right vendor to implement Secure Access Service Edge…
Network Transformation
Navigating the dynamic landscape of network security can be a…
Network Transformation
As a Network Security Administrator, choosing between Secure Access Service…
Network Transformation
In the rapidly evolving digital landscape, choosing the right network…
Security Enhancement
As the digital age continues to evolve, supply chains are…
Security Enhancement
As a supply chain manager, you are undoubtedly aware that…
Security Enhancement
In an interconnected world, the supply chain has become a…
Security Enhancement
Securing your supply chain from cyber threats is no longer…
Security Enhancement
In the interconnected world of digital commerce, supply chain security…
Network Transformation
Digital innovation is no longer a buzzword—it’s a crucial strategic…
Security Enhancement
In the modern business landscape, digital innovation is not just…
Network Transformation
In the era of rapid digitalisation, Artificial Intelligence (AI) has…
Security Enhancement
As the digital landscape expands, cybersecurity has become an inescapable…
Network Transformation
In an era defined by digital transformation, Secure Access Service…
Network Transformation
As the prominence of Secure Access Service Edge (SASE) grows,…
Network Transformation
In the rapidly evolving world of network architecture, Secure Access…
Network Transformation
The emergence of Secure Access Service Edge (SASE) has transformed…
Cloud Transformation
As the world becomes increasingly digital, the importance of effective…
Cloud Transformation
For businesses grappling with the decision between cloud and on-premise…
Cloud Transformation
As an IT strategist, one of the key decisions you…
IT Modernisation
In the complex landscape of ERP solutions, SAP’s S/4HANA Cloud…
Security Enhancement
As the digital landscape continues to evolve, the concept of…
Security Enhancement
The concept of the human firewall places employees at the…
Security Enhancement
Culture is an integral part of any organisation, and when…
Security Enhancement
Training employees to serve as a human firewall is one…
Cloud Transformation
In the world of cloud security, Cloud Security Officers understand…
Cloud Transformation
Cloud Security Officers today face an increasingly challenging landscape filled…
Cloud Transformation
As businesses continue their digital transformations and adopt cloud technologies,…
Security Enhancement
As businesses digitalise their processes and operations, the likelihood of…
Cloud Transformation
Cloud Security Officers understand that technology and policies are just…
IT Modernisation
The enterprise resource planning (ERP) landscape is continually evolving, and…
IT Modernisation
Choosing an ERP solution is a major decision for businesses….
IT Modernisation
Deciding on an ERP solution is a critical decision for…
IT Modernisation
Navigating the landscape of Enterprise Resource Planning (ERP) solutions can…
Network Transformation
Secure Access Service Edge (SASE) has quickly become a buzzword…
Network Transformation
The world of information technology is in constant flux, and…
Cloud Transformation
Cloud computing has become an essential part of modern business,…
Security Enhancement
Cybersecurity risks are real. As demonstrated by recent security breaches,…
Cloud Transformation
The Well-Architected Framework is a methodology developed by the cloud…
Security Enhancement
Data privacy and protection of personal information – it’s something…
Network Transformation
In the realm of modern-day networking and cloud computing, there…
IT Modernisation
December 31, 2027 is when SAP is officially ending mainstream…
Network Transformation
Hybrid working and the proliferation of cloud-based applications create five…
Network Transformation
It’s increasingly clear that edge computing is now centre-stage for forward-looking organisations…
Cloud Transformation
Since 2021, leading businesses in Asia Pacific (APAC) have been…
Security Enhancement
It’s only recently that the world started seeing the tangible…
Security Enhancement
3 technology and process security risks that you need to…
Security Enhancement
In recent days, there has been so much news about…
Security Enhancement
Most businesses in the APAC region have experienced at least…
Network Transformation
We explored the common pain points that SASE solves and…
Cloud Transformation
As the South East Asian economies emerge from the lockdowns,…
Cloud Transformation
Table of Contents Introduction What is digital transformation? Why should…
Cloud Transformation
It is no secret that centralized data centers and their…