Information Technology

CEOs leverage Gen-AI in organisational planning

52% say it shapes competitive positioning.

CEOs leverage Gen-AI in organisational planning

52% say it shapes competitive positioning.

AI agents combat the lack of skilled workers to improve AI models

These agents are formed by embedding AI with pre-built use cases into enterprise applications.

Multi-cloud shift drives demand for AI-driven data integration

Providers are responding with collaboration, led by Oracle.

AI drives transformation in compliance and risk management

AI adoption enhances productivity but faces knowledge barriers.

CISOs prioritise security as ai threats surge

AI’s rapid evolution forces CISOs to view security as a core operational strategy.

Philippine firms up IT resilience amidst rising cyberattacks

The Philippines has witnessed a threefold increase in cyberattacks last year.

Deloitte: AI complements human roles, not replaces them

Humans are a critical part of generative AI solutions.

Companies struggle with fragmented entity verification systems

Moody’s report shows that nearly two-thirds of companies describe their own as fragmented or inconsistent.

Malaysia Technology Excellence Awards 2024 Winner: OGAWA WORLD BERHAD

OGAWA World Berhad was lauded with the AI - Health Products & Services award at the Malaysia Technology Excellence Awards 2024 for their AI...

Layered security needed to combat risks in robotics

Phased integration helps mitigate cyber threats and manage expenses.

Scarcity and high Inflation drop data centre transactions

There are four factors in total that contributed to the decline.

Cracking the Human Code in Cybersecurity

There is an urgent need for organizations to adopt comprehensive cybersecurity strategies.

Malaysia Technology Excellence Awards 2024 Winner: PRISMA KHAS SDN BHD

Hazri Bin Tan Sri Haidar, Managing Director of Prisma Khas Shd Bhd, delved into the intricacies of managing large data volumes, showcasing how these...

Security testing balances speed, safety in business

Continuous integration of security measures with business agility highlighted as essential.

Continuous assurance vital in cybersecurity landscape

Continuous identification and prioritisation of vulnerabilities emphasised for effective defence.