Information Technology
AI agents combat the lack of skilled workers to improve AI models
These agents are formed by embedding AI with pre-built use cases into enterprise applications.
Multi-cloud shift drives demand for AI-driven data integration
Providers are responding with collaboration, led by Oracle.
AI drives transformation in compliance and risk management
AI adoption enhances productivity but faces knowledge barriers.
CISOs prioritise security as ai threats surge
AI’s rapid evolution forces CISOs to view security as a core operational strategy.
Philippine firms up IT resilience amidst rising cyberattacks
The Philippines has witnessed a threefold increase in cyberattacks last year.
Deloitte: AI complements human roles, not replaces them
Humans are a critical part of generative AI solutions.
Companies struggle with fragmented entity verification systems
Moody’s report shows that nearly two-thirds of companies describe their own as fragmented or inconsistent.
Malaysia Technology Excellence Awards 2024 Winner: OGAWA WORLD BERHAD
OGAWA World Berhad was lauded with the AI - Health Products & Services award at the Malaysia Technology Excellence Awards 2024 for their AI...
Layered security needed to combat risks in robotics
Phased integration helps mitigate cyber threats and manage expenses.
Scarcity and high Inflation drop data centre transactions
There are four factors in total that contributed to the decline.
Cracking the Human Code in Cybersecurity
There is an urgent need for organizations to adopt comprehensive cybersecurity strategies.
Malaysia Technology Excellence Awards 2024 Winner: PRISMA KHAS SDN BHD
Hazri Bin Tan Sri Haidar, Managing Director of Prisma Khas Shd Bhd, delved into the intricacies of managing large data volumes, showcasing how these...
Generative AI aids hackers in entering high-risk systems
AI tools are misused by cybercriminals.
Security testing balances speed, safety in business
Continuous integration of security measures with business agility highlighted as essential.
Continuous assurance vital in cybersecurity landscape
Continuous identification and prioritisation of vulnerabilities emphasised for effective defence.
Collaborative efforts key to uncover vulnerabilities in cybersecurity
Ethical hacking enhances cybersecurity globally.