Insights

Counting the cost of the biggest BEC attacks

Robust email protection is a necessity for protecting against one of the industry’s most sophisticated attack types; Business Email Compromise (BEC). Andrew Rose, Resident CISO, Proofpoint, offers some top tips...

Granules India uses Veeam solutions to accelerate mission-critical backups by...

The business challenge Since 1984, Granules India has been producing high-volume, high-quality medications for global healthcare enterprises. To help control costs while maintaining exceptional production quality,...

How Zero Trust can lead the battle against ransomware

Sydney-based Ian Farquhar, Field CTO, Gigamon, tells us how in a world where the workforce has shifted significantly to a ‘work anywhere, work anytime’ model, embracing Zero Trust makes sense. Zero Trust...

How to modernize those legacy apps without compromising security

Yaniv Hoffman, Vice President and Managing Director – Radware APJ, tells us how legacy apps can be modernized without security problems. He says: “It is through frictionless security that critical...

Embedded Finance’s watershed year

Banking is continuously changing, especially as the world becomes increasingly digital. Adrian Toynton, Head of Banking Solutions, APAC, FIS, tells us why Banking-as-a-Service (BaaS) is instrumental in shaping the...

If achieving effective security is the question … Zero Trust is the answer

Steve Singer, Regional Vice President and ANZ Country Manager, Zscaler, tells us how IT leaders can achieve effective security with Zero Trust. The past two decades have seen astounding progress made in all areas of...

Browse our latest issue

Intelligent CIO APAC

View Magazine Archive