JG: Governments and financial institutions can engage more frequently with industry practitioners through three key initiatives: Sharing of known threats and prevention measures: A proactive approach ...
While AI may be a key enabler for financial inclusion in Asia Pacific and across ASEAN, it has already demonstrated its power for financial crime in the hands of bad actors. Can AI advancements also ...
One qualitative conclusion in a cybersecurity firm’s annual threat analysis is that cybercrime has evolved into a complex, self-sustaining chain reaction Based on a yearly data-driven process of ...
Fortunately, successful white-hat “model-hackings” now will harden such vehicles against real hackers. For those who have been eagerly observing the steady move towards autonomous driving, the last ...
A recent vulnerability in the MAC layer protocols in wireless networks has opened a Pandora’s Box for further intensive 5G research A recent vulnerability called SPARROW (CVD-2021-0045) has been ...
What has trendjacking and the popular Netflix serial Squid Game have in common? Squid Game has not only won over millions of fans; it has attracted cybercriminals, too. And it’s both coincidental and ...
Wearable devices that transmit heartrate and vital-signs data to the Cloud need to know what one cybersecurity firm has just announced. With a majority of healthcare providers rushing the ...
As threats evolve with remote working becoming the norm, approaches to access governance and security postures need a rethink. Remote working has become the norm and organizations across Asia Pacific ...
Understanding the history of cybersecurity is crucial in navigating today’s ever-evolving landscape – and to prepare for the future. Cybersecurity has evolved significantly through the years, but much ...
As the year 2024 draws to a close, cybercriminals appear to still have an edge over cyber-defenders. What’s new and what should we do about it? 2024 marks a year where CISOs and cybersecurity vendors ...
Software and data are critically important because Formula E racecars have an electric powertrain, and winning races in this series is roughly 50% about the car’s hardware and 50% dependent on on-car ...
Insider threats are on the rise, with 60% of data breaches involving insiders. Since insiders already have access to critical data, their actions can pose significant risks if left unchecked.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results