DataCenterNews Asia Pacific - Specialist news for cloud & data center decision-makers

Ponemon Institute stories

Ai sovereignty secure datacenter on bedrock shield circuitry

No compromise: Designing AI operations for sovereignty and reliability

Last week
#
data protection
#
private cloud
#
hybrid cloud
IT leaders are racing to redesign AI operations so sovereignty, data residency and reliability can coexist under tightening global rules.
Moody nighttime office insider copying files digital security shield

Insider risk costs soar as AI reshapes workplace data

Last week
#
data protection
#
endpoint protection
#
pam
Insider risk now costs organisations an average USD $19.5 million a year as AI reshapes data access and employee negligence drives losses.
Tangled rusty circuit padlock over cloud servers outdated security

Legacy PKI blamed for outages & rising security risk

Thu, 22nd Jan 2026
#
encryption
#
cloud security
#
iam
Legacy PKI and manual certificate management are driving outages and security exploits as machine identities surge, CyberArk research warns.
Apac skyline dusk rusty pki locks vs modern cloud security net

Legacy PKI leaves APAC exposed to outages, breaches

Thu, 22nd Jan 2026
#
devops
#
digital transformation
#
encryption
Legacy PKI and manual certificate management leave APAC firms exposed to outages, cyber risks and compliance failures, CyberArk warns.
Ai driven cost savings data management office workers analyzing charts

AI spend to focus on cost, outcomes & data in 2026 shift

Fri, 14th Nov 2025
#
firewalls
#
hybrid cloud
#
network security
In 2026, firms will shift AI investment towards cost-efficiency, data governance, and measurable outcomes amid rising scrutiny of AI returns, says OpenText.
Secure identity management ai integration network human figures shields

Saviynt adds AI-powered tools to simplify identity management

Thu, 16th Oct 2025
#
pam
#
partner programmes
#
iam
Saviynt has launched AI-powered tools to simplify identity management, securing applications and governing human and non-human identities in enterprises.
Techday cc8c0876c10b615a8faf

New report reveals persistent API security breaches risk

Fri, 1st Nov 2024
#
advanced persistent threat protection
#
breach prevention
#
genai
A new Traceable AI report reveals 57% of organisations have suffered API breaches, highlighting significant flaws in current security measures.
Techday cca7bae74e108f3ea579

Insider threats highlighted, calls for enhanced security measures

Mon, 16th Sep 2024
#
data protection
#
encryption
#
mfa
As National Insider Threat Awareness Month unfolds, experts warn of rising risks from employees, urging firms to adopt stricter security measures to combat evolving threats.
Techday 79bc882c7480d4a3f609

Trustwave highlights critical cyber threats to financial services

Wed, 11th Sep 2024
#
ransomware
#
crypto
#
blockchain
Trustwave's latest reports unveil growing cryptocurrency and ransomware threats in financial services, highlight the urgency of combating phishing-as-a-service and insider threats.
Img uuonn2r63fwhf8lemc0jityt

Zero Trust study highlights rising concern over identity security

Tue, 4th Jun 2024
#
network infrastructure
#
ransomware
#
cloud services
Identities top the list of priority risks for organisations' Zero Trust strategies, reveals a global study by Entrust, highlighting a shift from compliance to pre-emptive security efforts.
Img x45gfqrpdjpylnmin2vddwaa

Cybersixgill launches AI tool to streamline threat reports

Thu, 30th May 2024
#
ai
#
cybersecurity
#
mssp
Cybersixgill debuts its AI-powered IQ Report Generator, offering rapid, customised threat intelligence reports, revolutionising the CTI reporting process for MSSPs and security teams.
Img sfgjangjsy5zi2i3kreu4awi

Organisations battle AI risks amid rise in supply chain attacks

Fri, 17th May 2024
#
malware
#
supply chain
#
ai
More than half of global organisations faced software supply chain attacks this year, with many struggling for months to respond, a new Synopsys report reveals.
Monitor vulnerabilities

BackBox introduces Network Vulnerability Manager for organised risk assessment

Mon, 23rd Oct 2023
#
advanced persistent threat protection
#
risk & compliance
#
cloud services
BackBox launches Network Vulnerability Manager, a tool for automated risk assessment and efficient remediation.
Quantum

Insufficient investment in quantum-safe strategies concerns IT leaders

Fri, 20th Oct 2023
#
digital transformation
#
encryption
#
advanced persistent threat protection
Insufficient investment in quantum-safe strategies leaves global IT leaders feeling vulnerable, especially in the APAC region.
Gettyimages 1435605327

Cato Networks extends ZTNA capabilities to include on-premises

Wed, 12th Jul 2023
#
casb
#
sase
#
zero trust security
A critical way to stop insider threats is by ensuring that users and IT administrators only have access to the necessary resources.
Gettyimages 1132912672

Public Key Infrastructure adoption and the future of cyber risk

Wed, 8th Mar 2023
#
data protection
#
iot
#
healthtech
Public Key Infrastructure (PKI) naturally plays a big role as organisations need to make sure they have the right security solutions.
Gettyimages 1203522802

Ponemon Institute study investigates challenges and opps of PKI

Fri, 11th Nov 2022
#
iot
#
risk & compliance
#
cybersecurity
The study found that regulatory landscape and newer use cases such as cloud-based services and IoT that are driving the adoption of PKI.
Gettyimages 1145632379

Insider threats cannot be eliminated but zero-trust can limit the damage

Thu, 10th Nov 2022
#
data protection
#
zero trust security
#
cybersecurity
According to a Ponemon Institute study conducted, insider threats have increased in both frequency and cost over the past two years.
Gettyimages 1144874552

Email revealed to be riskiest channel for data loss

Wed, 25th May 2022
#
email security
#
dlp
#
risk & compliance
More than half (60%) of organisations experienced data loss or exfiltration caused by an employee mistake on email in the last 12 months.
Gettyimages 181549536  1

Divide between IT and OT teams hindering unified cybersecurity strategies

Fri, 12th Nov 2021
#
cybersecurity
#
ponemon institute
#
cybersecurity strategy
Organizations are hindered by a cultural divide between IT and OT teams, preventing a unified cybersecurity strategy, a report from Dragos has found.