• YouTrip sets up SG innovation lab; developing YouTrip Business product

    WalkMe Predicts How User Experience Will Change in 2022

    The past year has been testament to the value and importance of digital adoption. According to a recent Deloitte study, the enablement of digital platforms has allowed small businesses in the Asia Pacific region to become micro-multinational enterprises (mMNEs), as they now engage in cross-border operations and services for global buyers. With new organisations joining the fray daily, digitally…


  • Comments: OG department store data breach

    Comments: OG department store data breach

    Comments: OG department store data breach


  • Xero partners with DBS Bank to help SMEs in Singapore ‘Start Digital’

    SME Trends and Predictions for 2022 by XERO

    By: Xero Asia’s Managing Director, Kevin Fitzgerald #1: SMEs will shift into growth mode with a strong focus on digitalisation In 2021, small businesses accelerated their digital investments to survive prolonged COVID-19 pandemic restrictions. In 2022, they will take a more focused approach to digital adoption.  Some will look to digital tools to expand their…


  • How to evaluate the ROI of your software security program

    Race Against Time to Mitigate the Impact of the “Log4Shell” Vulnerability

    By: Steven Ng, CIO and EVP of Managed Security Services, Ensign On 9 December 2021, the critical vulnerability (CVE-2021-44228, also known as “Log4Shell”) in a widely used Apache logging framework service, log4j2 library, was reported to be under active exploitation by threat actors. Log4Shell’s Impact on the World As Log4j is one of the most popular…


  • Digital Realty opens its second data center in Hong Kong

    What will the data protection industry look like in 2022?

    By: Danny Allan, Chief Technology Officer at Veeam Acquisitions will stagnate as company valuations outstrip available assets In 2021, global M&A activity reached new highs aided by low interest rates and high stock prices. In 2022, we will see that momentum shift. Larger acquisitions will be few and far between as company valuations continue to…


  • Comments: Volvo Cars - the latest cyberattack victim: Research & Development data stolen

    Comments: Volvo Cars – the latest cyberattack victim: Research & Development data stolen

    Comments by: Chris Clark, Senior Manager at Synopsys Software Integrity Group Automotive manufacturers go to great lengths to keep next model year vehicles from prying eyes and the same is true for data, especially R&D data. Protecting key assets like research data is especially critical in a high-intensity market like automotive. The drive to reduce 200…


  • One Identity Offers Free Security Risk Assessment to SolarWinds Customers and Free Safeguard for Proactive Privilege Defense

    Comments: Protect Yourself Against the Apache Log4j Vulnerability

    Comments by: Lotem Finkelstein, Director, Threat Intelligence and Research for Check Point Software Technologies  I cannot overstate the seriousness of this threat. On the face of it, this is aimed at crypto miners but we believe this creates just the sort of background noise that serious threat actors will try to exploit in order to…


  • How COVID-19 Is Impacting Security

    Where are You Saving Your Passwords?

    By: Jeffrey Kok, Vice President Solution Engineers for Asia Pacific and Japan at CyberArk. Given all the accounts all of us maintain in the digital world, good password hygiene is a security measure that individuals and organisations alike must practice to defend against cyber threats. However, despite knowing the importance of unique passwords, we are…


  • Carsome Announces Series D Fundraising

    The Automotive Landscape in 2022 and Beyond

    By: Sarah Tatsis, SVP, BlackBerry IVY Platform Development The future of automotive transportation will be defined by two domains: the driving function and the in-car user experience. 2022 will see: The Rise of Killer App(s) – A series of applications that support and complement each other emerge over the next couple of years and it…


  • How to Cyber Security: It’s all about developers, except when it’s not

    Six Python security best practices for developers

    But like all programming languages, Python is not immune to security threats. Secure coding best practices must be adopted to avoid risks from attackers. In this article, we’ll explore Python security best practices that should employed when building secure application.