-
WalkMe Predicts How User Experience Will Change in 2022
The past year has been testament to the value and importance of digital adoption. According to a recent Deloitte study, the enablement of digital platforms has allowed small businesses in the Asia Pacific region to become micro-multinational enterprises (mMNEs), as they now engage in cross-border operations and services for global buyers. With new organisations joining the fray daily, digitally…
-
-
SME Trends and Predictions for 2022 by XERO
By: Xero Asia’s Managing Director, Kevin Fitzgerald #1: SMEs will shift into growth mode with a strong focus on digitalisation In 2021, small businesses accelerated their digital investments to survive prolonged COVID-19 pandemic restrictions. In 2022, they will take a more focused approach to digital adoption. Some will look to digital tools to expand their…
-
Race Against Time to Mitigate the Impact of the “Log4Shell” Vulnerability
By: Steven Ng, CIO and EVP of Managed Security Services, Ensign On 9 December 2021, the critical vulnerability (CVE-2021-44228, also known as “Log4Shell”) in a widely used Apache logging framework service, log4j2 library, was reported to be under active exploitation by threat actors. Log4Shell’s Impact on the World As Log4j is one of the most popular…
-
What will the data protection industry look like in 2022?
By: Danny Allan, Chief Technology Officer at Veeam Acquisitions will stagnate as company valuations outstrip available assets In 2021, global M&A activity reached new highs aided by low interest rates and high stock prices. In 2022, we will see that momentum shift. Larger acquisitions will be few and far between as company valuations continue to…
-
Comments: Volvo Cars – the latest cyberattack victim: Research & Development data stolen
Comments by: Chris Clark, Senior Manager at Synopsys Software Integrity Group Automotive manufacturers go to great lengths to keep next model year vehicles from prying eyes and the same is true for data, especially R&D data. Protecting key assets like research data is especially critical in a high-intensity market like automotive. The drive to reduce 200…
-
Comments: Protect Yourself Against the Apache Log4j Vulnerability
Comments by: Lotem Finkelstein, Director, Threat Intelligence and Research for Check Point Software Technologies I cannot overstate the seriousness of this threat. On the face of it, this is aimed at crypto miners but we believe this creates just the sort of background noise that serious threat actors will try to exploit in order to…
-
Where are You Saving Your Passwords?
By: Jeffrey Kok, Vice President Solution Engineers for Asia Pacific and Japan at CyberArk. Given all the accounts all of us maintain in the digital world, good password hygiene is a security measure that individuals and organisations alike must practice to defend against cyber threats. However, despite knowing the importance of unique passwords, we are…
-
The Automotive Landscape in 2022 and Beyond
By: Sarah Tatsis, SVP, BlackBerry IVY Platform Development The future of automotive transportation will be defined by two domains: the driving function and the in-car user experience. 2022 will see: The Rise of Killer App(s) – A series of applications that support and complement each other emerge over the next couple of years and it…
-
Six Python security best practices for developers
But like all programming languages, Python is not immune to security threats. Secure coding best practices must be adopted to avoid risks from attackers. In this article, we’ll explore Python security best practices that should employed when building secure application.