Has adoption of “connected devices” outpaced security?
Our ability to build and deploy intelligent, connected devices has outpaced our…
Q&A: Against new online threats, strengthen defence perimeter and boost cyber hygiene education, says NTT
Businesses must keep strengthening the defence perimeter and educate stakeholders on cyber…
Protect your organisation’s crown jewels: Production data
Using one's production data for software or app development in a staging…
Securing one’s software supply chain in an era of complex, interconnected systems
Securing one's software supply chain is not easy today, but tools that…
Singapore government sets up ransomware task force as threats grow
The Singapore government has set up a taskforce that involves multiple agencies…
Four influential trends that will accelerate IT and OT convergence in 2022
Four important trends that will accelerate enterprises’ digital efforts, improving their operational…
How your laptop can help boost your enterprise security posture
Enterprises need to find a way to better secure endpoint devices like…
As issues of fairness and sustainability boil over, a developer sabotages his open-source code in protest
The most important software that underpins so much of today's digital infrastructure…
Latest Log4j vulnerability a reminder of far reaching impact of software dependencies
In an interconnected digital world, where software runs everything, a flaw in…
Why it’s time for an AMD Ryzen PRO inside your next business laptop
AMD Ryzen™ PRO 5000 Series Mobile Processors now come with a range…
Half of Singapore SMBs hit by cyberattacks lost US$500,000 or more: Cisco
Forty per cent of SMBs in Singapore were hit by a cyberattack…
MyRepublic data breach, the latest to hit a Singapore Internet service provider, should raise alarms
These MyRepublic data breach and other recent ones are worrying enough for…
Twist in Poly Network heist, as hacker who stole digital coins says it was done for good
The hacker is believed to have overwritten the instructions on smart contracts…
What caused the data leak at StarHub, the latest telco to get hit?
As the StarHub data leak shows, efforts to mitigate a damaging incident…
Yet another supply chain cyberattack, now on Kaseya, should worry businesses
As yet another supply chain breach at Kaseya shows, the risk of…
Cybersecurity needs updating with hybrid workstyles but talent is hard to find
After they moved to the cloud in an unplanned or accelerated fashion,…
Businesses use the cloud to manage risk but are they also concentrating it?
As businesses rely more on public cloud providers to run their operations,…
As ransomware evolves, businesses need new tools to fight back
Businesses need the right tools and expertise to proactively hunt for threats…
In Singtel hacking case, lessons to be learnt on managing fallout
It is impossible to stop all cyberattacks, so how a business responds…
Log in to e-services by scanning your face, sending SMS to children for SingPass verification
By scanning their faces to verify their identity, SingPass users can sign…