The Ultimate Guide to Privileged Access Management
A curated Asian edition of TechDay news, analysis, interviews, reviews, job moves, and related resources for Privileged Access Management (PAM).
What to know about Privileged Access Management
Privileged Access Management (PAM) is a critical component of cybersecurity focused on securing, controlling, and monitoring privileged accounts and access within an organisation. Privileged access refers to elevated permissions that allow users to perform sensitive operations in IT systems, networks, cloud environments, and applications. Managing these privileges effectively helps prevent insider threats, credential theft, and external cyberattacks that can lead to severe data breaches or operational disruptions.
The stories tagged with Privileged Access Management highlight industry developments such as new product features, security enhancements, integrations with cloud services, AI-powered automation, and partnerships aiming to strengthen PAM strategies. They emphasize challenges organisations face in maintaining visibility and control over privileged accounts, especially as hybrid cloud architectures, DevOps workflows, and remote work increase the complexity of access management.
Reading about Privileged Access Management on our blog provides insights into best practices for implementing least privilege principles, just-in-time access, multi-factor authentication, and zero trust security models. The content also underscores regulatory compliance considerations and the evolving threat landscape, including ransomware and insider misuse. By exploring these stories, readers can learn how PAM solutions adapt to emerging technologies and cyber risks to safeguard critical infrastructure and sensitive information effectively.
Asian Privileged Access Management News
Regional stories with direct local relevance
Singapore firms face AI security incidents despite controls
Singapore firms report AI security incidents despite controls, as Proofpoint warns deployment of assistants and agents is outpacing monitoring.
Singapore firms urged to loosen AI identity controls
Singapore firms warn of AI identity gaps as most security teams are pressed to relax controls, with machine accounts and agents posing risks.
Keeper adds browser isolation to privileged access
Keeper Security has upgraded KeeperPAM with remote browser isolation, multi-tab support and AI session monitoring to better secure web-based privileged access.
Keeper expands PAM distribution with Ingram in Singapore
Keeper deepens its Ingram Micro alliance in Singapore, extending KeeperPAM to more partners amid rising identity-based cyber attacks.
Coupang breach & camera hacks expose Asia cyber gaps
A vast Coupang data breach and mass camera hacks in South Korea expose Asia's widening cyber security gaps and weak identity defences.
Keeper Security partners with Macnica to boost password safety in Japan
Keeper Security partners with Macnica to enhance password security for Japanese enterprises amid rising cyber threats and digital transformation.
Analyst Insights
Research and market analysis connected to Privileged Access Management
Capsule Security raises $7 million to guard AI agents
Keeper unveils KeeperDB to tighten database access
Cayosoft posts 76% ARR surge on identity recovery boom
Okta unveils tools to detect & govern shadow AI risks
Tanium named Leader in Gartner 2026 endpoint report
Featured News
How Formula 1 turns data & cyber security into speed
At Albert Park, F1 insiders reveal how sharper data use, tighter security and resilience planning combine to unlock race-winning performance.
Consolidation Wave Hits Infosec, Sparing CISOs From Tool Sprawl
Overwhelmed CISOs are driving a consolidation wave in cybersecurity, slashing tool sprawl to close security gaps and cut mounting costs.
Expert Columns
Why service desks are emerging as a critical security weakness
2026: Resilience, the new foundation of cybersecurity
Watch out for these eight trends to impact cybersecurity teams in 2026
2026 Predictions: The year identity becomes the ultimate control point for an autonomous world
Meet credential auditor: Take control of credential sprawl with automated discovery and dontrol
Interviews
Interviews and video coverage from the networkRecent Privileged Access Management News
Heng Leong Hang adopts CyberArk platform for enhanced cybersecurity
Taiwanese retail giant, Heng Leong Hang, enhances cyber defence with the integration of CyberArk's Identity Security Platform into its cyber security strategy to protect core systems and customer data.
Singapore firms suffer cybersecurity inertia as attacks take heavy toll
Despite Singapore's technological advancements, research from CyberArk reveals 38% of firms rarely update their security strategies even after cyber attacks.
APAC firms struggle as AI identities swell, survey finds
Asia-Pacific firms face mounting identity security strain as AI agents and machine accounts swell, with 94% of IT leaders reporting difficulties.
OpenAI launches GPT-5.5-Cyber for vetted defenders
OpenAI widens access to GPT-5.5-Cyber for vetted defenders, tightening identity checks and safeguards for authorised security work.
Genetec urges tighter identity controls for security systems
Genetec warns AI-driven attacks are exposing weak passwords and access gaps in connected cameras, doors and cloud-based security systems.
Recast adds Intune tools for hybrid endpoint teams
Recast expands Right Click Tools with Intune, Autopilot and patching updates to help hybrid Microsoft endpoint teams manage devices from one place.
Keeper Security launches Agent Kit for AI coding agents
Keeper Security launches Agent Kit to let AI coding assistants handle secrets and admin tasks without exposing credentials in chat logs.
Qualys warns cloud risk now stems from identity design
Qualys report says cloud breaches are increasingly driven by identity design, delegated trust and slow remediation as AI widens exposure.
Keeper launches Verify Mode to block phishing logins
Keeper Security launches Verify Mode for enterprise browser extension, warning users before passwords are entered on suspicious sites to curb phishing logins.
The Gentlemen becomes second most active ransomware group
The Gentlemen ransomware group has surged to second place in 2026 by victim count, with Check Point saying it may be far larger than its public tally.
Critical Microsoft vulnerabilities double in yearly report
Critical Microsoft flaws double as Azure and Dynamics 365 risks surge, BeyondTrust warns organisations to prioritise identity and privilege controls.
Sysdig report says cloud security shifts to machine speed
Sysdig says companies are increasingly leaning on automated defence as AI-driven attacks accelerate, with machine identities now dominating cloud access.
Keeper boosts endpoint privilege governance for firms
Keeper Security adds approval workflows and audit logging to Endpoint Privilege Manager as enterprises tighten control over temporary admin access.
Secureframe launches access review tool for compliance teams
Secureframe adds user access reviews to Comply platform to help compliance teams replace spreadsheets and email with a single audit-ready workflow.
Attackers exploit trust in Blackpoint Cyber report
Blackpoint Cyber warns attackers are increasingly slipping in through trusted credentials, VPNs and remote tools, with fake CAPTCHA scams leading incidents.
Exabeam expands AI agent analytics to ChatGPT, Copilot
Exabeam widens AI agent monitoring to ChatGPT and Copilot, as chief AI and product officer Steve Wilson says digital workers need closer oversight.
Bitdefender launches free attack surface assessment
Bitdefender offers free 45-day internal security check to spot over-entitled staff access as attackers increasingly abuse trusted tools.
RSA expands Microsoft tie-up with passwordless access
RSA deepens its Microsoft 365 E7 alliance to secure human and AI identities, rolling out wider passwordless access across complex estates.
AI agents blur human access lines in enterprise systems
Most organisations cannot distinguish AI agents from human staff, exposing widening identity and access risks as autonomous tools spread.