https://apac.lumen.com/security-enhancement/lumen-ddos-application-threat-report-q4-2023/
Cybersecurity
What are the cybersecurity hot takes for 2024?
Cyberattackers in the Asia Pacific region have become increasingly smarter with the advent of generative AI. As large language models are integrated into consumer-facing products, the threat surface for cyberattackers has also expanded. However, generative AI also offers specialised capabilities to more efficiently counter the evolving threats posed by malevolent actors. In 2023, cyberattackers used […]
Overcoming challenges in multi-cloud compliance
Cloud compliance simply means that a business’ cloud-delivered system has to be compliant with the standards required by the end users or customers. Cloud technology remains the linchpin of today’s accelerated digital transformation strategies in the Asia-Pacific region. With the introduction of new technologies like generative AI, legacy infrastructure becomes unsustainable in a world driven […]
How to boost your cybersecurity hygiene with best practices
Establishing robust cybersecurity hygiene through the continuous improvement of your organisation’s security posture is critical in mitigating the risks of data breaches, operational disruptions, and reputational harm. A strong security stance is pivotal in countering emerging threats and effectively neutralising existing ones. This is even more critical as businesses continue to invest in new technologies […]
“Think Like a Hacker” to Enhance Security Posture
The frequency of ransomware attacks shows no signs of relenting in 2023. If anything, ransomware attack techniques are evolving and becoming increasingly elusive. This evolution renders common endpoint solutions inadequate to counteract these attacks. How do you define a strong security posture? It is not unusual for most digitally modernised organisations to have thousands of […]
Supply Chain Cybersecurity and Regulatory Compliance
As the digital age continues to evolve, supply chains are becoming increasingly complex and intertwined. Along with this complexity comes the need for heightened security, as cyber threats continue to rise. However, cybersecurity is not only about protecting your supply chain from potential attacks; it’s also about regulatory compliance. In this blog article, we will […]