By Aaron Bugal, Field CISO, APJ, Sophos AI is fast becoming the new productivity engine in Malaysia’s corporate landscape. From copilots that summarise reports to chatbots that draft emails, employees are discovering clever ways to work faster and smarter. But in the rush to embrace innovation, a new blind spot has emerged: shadow AI. Shadow ... Read more ›
28
New detection and response methods proactively defend enterprises from new adversary tactics CrowdStrike introduces new innovations for fileless attack prevention at scale and improved visibility for stealthy cloud intrusions Today, companies must deal with increasingly sophisticated network threats. To combat these cyber attackers, cybersecurity technology has experienced rapid development and innovation. One example is AI... Read more » Read more ›
14
Article by Tom Kellermann, Head of Cybersecurity Strategy at VMware Island hopping – the term has a nice ring to it with the two words conjuring images of fun-filled adventure or an exotic holiday exploring new locales. The reality is anything but. Island hopping is a technique used by cybercriminals to hijack an organization’s infrastructure... Read more » Read more ›
8
After announcing regions in Thailand and New Zealand in the Asia Pacific region, Google Cloud has confirmed that Malaysia will also be having a cloud region to meet the growing demand for cloud services locally and around the world. According to Ruma Balasubramanian, Managing Director, Southeast Asia, Google Cloud, the Malaysia cloud region will be... Read more » Read more ›
2
The third-generation semiconductors has materials like GaN and SiC, a must-have technology for many manufacturers at this point of time. They are suitable for high temperature, high frequency, radiation resistant and high power devices like electric vehicles, data centers, and renewable energy production. In the last few decades, semiconductors have evolved from the first to... Read more » Read more ›
2
42% of respondents worldwide indicate plans to upgrade to mobile-ready systems, with convenience being a major theme 60% of the respondents claimed that ease of use is the most important justification for switching to a new access control system The COVID-19 pandemic has significantly altered core organizational procedures. Due to the widespread adoption of remote... Read more » Read more ›
24
With cloud adoption in the financial services industry (FSI) increasing, securing the workloads and data as well as the network is a prerogative for organizations. Be it banks or financial markets, choosing the right cloud strategy and security framework needs to be a decision that can support the changes the industry goes through in the... Read more » Read more ›
9
Q-CTRL is creating a new generation of ultrasensitive “software-defined” quantum sensors The new technologies could have practical applications in the fields of space exploration, positioning, navigation, and timing (PNT) For good reason, quantum computing is receiving a lot of attention. It is poised to bolster the collection of computer resources with a powerful new tool.... Read more » Read more ›
2
Customer identity and access management (CIAM) have been a prerogative for organizations hoping to understand their consumers better. In recent times, the adoption of CIAM has seen an increase, especially with businesses adopting more digital solutions to cater to their customer needs. In fact, a study by IDC commissioned by Okta showed that the pandemic... Read more » Read more ›
2
Juniper Research has predicted that the number of buy now pay later users will surpass 900 million globally by 2027; increasing from 360 million in 2022. The increase will be driven by the anticipated economic downturn, which will increase the demand for low-cost credit solutions. Buy now pay later, a short-term finance solution that enables... Read more » Read more ›
14
Uncover how seamless meetings and video collaboration are being empowered like never before by sleek, next-gen Neat devices. Read more ›
131
Data breaches are becoming increasingly common despite the increased adoption of cybersecurity solutions. For organizations, one of the biggest reasons for breaches is their employees themselves. Stolen credentials continue to be the main cause of most data breaches around the world. Cybercriminals use these credential-based attacks to gain access and bypass organization security measures to... Read more » Read more ›
0
Burned-out security teams fight back lateral network migration and attacks with geopolitical motivations Cybercriminals’ new goal is to use deepfake technology to compromise organizations and gain access to their environment Deepfakes, an innovation brought about by the development of modern technology, are shaking up the media landscape. However, its innovation has been used for the... Read more » Read more ›
0
Google Cloud will be building and equipping new data centers in Malaysia, Thailand and New Zealand, which will mark the company’s first cloud region in each country. Once launched, those new regions will join Google’s 34 cloud regions currently in operation around the world—11 of which are located in Asia Pacific. Asia Pacific has been... Read more » Read more ›
0
HP Wolf Security report highlights the latest methods and phishing lures that target employees and put businesses at risk According to HP Wolf Security, the number of archive files containing malware, such as LNK files, has increased by 11% Threat actors harm people and organizations by using malicious software. Malware attacks only exist to try... Read more » Read more ›
0
As more banks and financial institutions leverage cloud services and other technologies to improve their products and services to meet customer demands, having a robust tech ecosystem is key for them. Over the years, fintech has revolutionized the banking and financial institutions. Today, if a bank or financial institution does not leverage the cloud or... Read more » Read more ›
0
73% of respondents think they have significantly increased their efforts to secure the software supply chain for their organizations A study by Enterprise Strategy Group reveals that software supply chain attacks are common in cloud-native apps Attackers have had to become more inventive with their own approach as a result of software development businesses taking... Read more » Read more ›
0
While remote working is still an option for some organizations globally, more companies are beginning to cut down on this work option and instead are requiring their employees to either work full time back in the office or a hybrid environment. Despite technology enabling remote work to be a seamless experience, there are still concerns... Read more » Read more ›
2
Cradle Fund will collaborate with Microsoft in the Microsoft for Start-Ups Founders Hub program to provide opportunities to improve skills, provide technical guidance to start-upbetweens in Malaysia. The collaboration Microsoft and Malaysia will also provide start-ups access to the Microsoft Mentor Network. Four months after launching its Microsoft for Startups Founders Hub in Asia, Microsoft... Read more » Read more ›
0
Trade anywhere in the world and see all your payments and refunds in one amazing dashboard. Explore the world's markets with ease! Read more ›
164
Micron Singapore nurtures a diverse, inclusive talent pool to be their best selves through innovation. Read more ›
33
Most popular sources
|
|
21% 11 |
|
|
17% 12 |
|
|
9% 8 |
|
|
6% 2 |
|
|
6% 17 |
| View sources » | |
LIKE us on Facebook so you won't miss the most important news of the day!
06.11.2025 12:35
Last update: 12:30 EDT.
News rating updated: 19:33.
What is Times42?
Times42 brings you the most popular news from tech news portals in real-time chart.
Read about us in FAQ section.