Predicting cyber-attacks, not as far-fetched as it sounds

Knowing your assailant’s next move can protect you from the next data breach. Armed with such information, security analysts could take proactive measures to protect sensitive data, patch or update vulnerable software, bolster security settings and block the attacker’s access and progress.

Digital identity – a precarious balancing act

People leave digital footprints everywhere; and this can become a problem as technology evolves.

Common domain-based brand abuse techniques and how to avoid them

Brands both large and small face increasing threats and risks as intellectual property becomes more vulnerable online.

A quantum of security

The advent of quantum computing may put today’s cybersecurity infrastructure in jeopardy

Connecting the dots in Asia Pacific: The case in India

Enjoy in-depth insights and expert analysis - subscribe to our Perspectives newsletter, delivered every week