Disruptive.Asia
  • Home
  • News
  • Views
  • Features
  • Off the Wire
  • Videos
  • Authors
  • About Us
    • About Us
    • Marketing Services

security

pandemic security consumers
Features

Consumers contributing to pandemic security side effects in Asia Pacific

September 21, 2021 Avanti Kumar 0

Survey finds that poor pandemic-related consumer behaviours are contributing to rising security side effects in the Asia Pacific region. Read more…

security must be
Views

Security must be built into everything because you never know what is next

September 7, 2021 Alex Leslie 0

Security must be discussed at the outset of everything. Examples are mounting of hackers reaping huge harvests from slack security practices. Read more…

IBM report
Views

IBM report describes the real cost of a data breach – and it is scary

August 2, 2021 Alex Leslie 0

The IBM report, now in its 17th year, illustrates just how expensive breaches are and it makes for scary reading. Costs rose 10% in 2020/21. Read more…

Education
Views

Education suffers huge increase in cyberattacks as pupils learn from home

July 19, 2021 Alex Leslie 1

Education is not an arena that you would think prone to cyberattacks. It is so critical to the future of everything, it should be exempt. Read more…

data breach
Views

Data breach at McDonald’s – what on Earth did they want, a Big Mac?

June 14, 2021 Alex Leslie 0

The recent data breach at McDonald’s in South Korea and Taiwan just sounds weird. A bank, insurance company, a telco are easy to understand. Read more…

5G security
Views

Will huge 5G speeds take the security challenge beyond human control?

June 9, 2021 Alex Leslie 1

The requirements for 5G security are very tough. The dream of hyper-fast connectivity balances the nightmare of the security challenge. Read more…

mobile operator
Views

Parents trust a mobile operator to keep kids safe online: major opportunity

June 7, 2021 Alex Leslie 0

Parents would trust their mobile operator to manage their children’s safety. This includes parental controls, gambling and violence. Read more…

fraud prevention
Views

The flaw in our fraud detection strategy – the wrong people know about it

June 1, 2021 Alex Leslie 0

Billions of dollars are spent on fraud detection and prevention. And apart from the brutal fact that we are one step behind, there is a flaw. Read more…

revenue generation
Views

Revenue generation vs fraud prevention: are we near the right balance?

May 27, 2021 Alex Leslie 0

Revenue generation has always been seen as a legitimate solution to the risk from fraud and the hacking community. Sadly, it still is. Read more…

hacking
Views

Hacking, scams, fakes soared in the pandemic, what happens afterwards?

May 19, 2021 Alex Leslie 0

Hacking horror stories, new and more devious scams and fake everything have all been given a boost during the pandemic. What happens now? Read more…

TM ONE
Features

TM ONE enhances cybersecurity capabilities to heighten digital trust

May 6, 2021 Avanti Kumar 0

TM ONE in Malaysia has embarked on a collaborative platform of initiatives to advance cybersecurity capabilities for enterprises. Read more…

5G security standards Europe India
News

EU looks to work with India on 5G security standards

April 20, 2021 Staff Writer 0

The European Union is looking to work with the Indian government to create open and transparent security standards for 5G technology. Read more…

cybersecurity
Views

Did we just give up on cybersecurity? Is it because the problem is too big?

April 19, 2021 Alex Leslie 0

Cybersecurity should be our main focus. But the worse the attacks get, the more apathetic we become, or so it seems. Read more…

security spotlight DDoS
Views

Security is in the spotlight – but there is a real twist at the global level

April 1, 2021 Alex Leslie 0

Security is in the spotlight at the moment, for several reasons. Some stories we read about daily, some we read about. Then read again. Read more…

SolarWinds hack
Views

Will the SolarWinds hack make us tighten security in the tech industry?

March 3, 2021 Alex Leslie 0

The SolarWinds hack was sophisticated and probably a harbinger of things to come. It signalled the end of ‘smash and grab’ tactics. Read more…

IATA Travel Pass
News

IATA unveils key design elements of IATA Travel Pass mobile app

January 20, 2021 News Centre 0

IATA has unveiled the IATA Travel Pass to help travellers easily and securely manage travel in line with government requirements for COVID-19 Read more…

5G challenging deployment
Views

Deploying 5G infrastructure, most challenging network rollout ever

January 19, 2021 Guest Writer 0

Deploying 5G infrastructure will be the most challenging network rollout ever, in terms of scale, scope, and most importantly, security. Read more…

data privacy power
Views

Data, privacy and power are back on the agenda but is anything different?

January 13, 2021 Alex Leslie 0

Data and privacy are back on the agenda and so, too, is power. We knew that the data issue would trigger arguments and counter arguments. Read more…

fight fraud
Views

The technology to fight fraud is awesome – why aren’t we using it?

January 11, 2021 Alex Leslie 0

The technology to fight fraud has reached a stage that is almost science fiction. From IMSI catchers, to Bluetooth catchers and WiFi catchers. Read more…

Healthcare
Views

Healthcare is being transformed and is transforming other sectors, fast

December 23, 2020 Alex Leslie 0

Healthcare was already being transformed by technology and now this transformation has been accelerating because of the pandemic. Read more…

Posts navigation

« 1 2 3 … 12 »

Languages

en English
af Afrikaanssq Shqipam አማርኛar العربيةhy Հայերենaz Azərbaycan dilieu Euskarabe Беларуская моваbn বাংলাbs Bosanskibg Българскиca Catalàceb Cebuanony Chichewazh-CN 简体中文zh-TW 繁體中文co Corsuhr Hrvatskics Čeština‎da Dansknl Nederlandsen Englisheo Esperantoet Eestitl Filipinofi Suomifr Françaisfy Fryskgl Galegoka ქართულიde Deutschel Ελληνικάgu ગુજરાતીht Kreyol ayisyenha Harshen Hausahaw Ōlelo Hawaiʻiiw עִבְרִיתhi हिन्दीhmn Hmonghu Magyaris Íslenskaig Igboid Bahasa Indonesiaga Gaeligeit Italianoja 日本語jw Basa Jawakn ಕನ್ನಡkk Қазақ тіліkm ភាសាខ្មែរko 한국어ku كوردی‎ky Кыргызчаlo ພາສາລາວla Latinlv Latviešu valodalt Lietuvių kalbalb Lëtzebuergeschmk Македонски јазикmg Malagasyms Bahasa Melayuml മലയാളംmt Maltesemi Te Reo Māorimr मराठीmn Монголmy ဗမာစာne नेपालीno Norsk bokmålps پښتوfa فارسیpl Polskipt Portuguêspa ਪੰਜਾਬੀro Românăru Русскийsm Samoangd Gàidhligsr Српски језикst Sesothosn Shonasd سنڌيsi සිංහලsk Slovenčinasl Slovenščinaso Afsoomaalies Españolsu Basa Sundasw Kiswahilisv Svenskatg Тоҷикӣta தமிழ்te తెలుగుth ไทยtr Türkçeuk Українськаur اردوuz O‘zbekchavi Tiếng Việtcy Cymraegxh isiXhosayi יידישyo Yorùbázu Zulu

Features

  • ASEAN cloud strategy
    Why ASEAN leaders are doubling down on cloud basics in 2023
    February 6, 2023 0
  • FinOps cloud
    Cloud FinOps: delivering business impact in Hong Kong
    January 30, 2023 0
  • Asian telecom operators metaverse
    Asian telecom operators step up investments in the metaverse
    January 25, 2023 0
  • hyper-personalisation digital banking
    Why hyper-personalisation wins in digital banking
    January 23, 2023 0

Off the Wire

  • ZTE releases new G5 series servers for intelligent computing
    January 17, 2023 0
  • ZTE launches R16 5G wireless router CPE MC888 PRO
    January 4, 2023 0
  • True and ZTE release Thailand’s first 50G PON prototype
    December 28, 2022 0
  • CMCC, ZTE build Intent Driven Enhanced Mobile User Experience
    November 11, 2022 0

Videos

  • Huawei revenue sanctions
    Huawei revenue holding up despite US sanctions
    December 31, 2022 0
  • Meta metaverse
    Meta accused of trying to buy dominance of the metaverse
    December 11, 2022 0
  • crypto world cup
    Crypto fan tokens are a hot item at this year’s World Cup
    November 30, 2022 0
  • blockfi bankruptcy
    BlockFi files for bankruptcy as the latest FTX casualty
    November 29, 2022 0

Coming Events

  • AI Asia Expo
    AI Asia Expo 2023, Bangkok 21-22 February
    September 13, 2022 0

Popular Posts

  • Navigating regulation around data-driven telecoms
    Navigating regulation around data-driven telecoms

Recent Comments

  • JW on NOW Telecom and USTDA move forward on Philippines 5G plan
  • Elsa on Amazon buys thermal cameras for own use from blacklisted Chinese firm
  • Paul Hai on Elon Musk, the Pyramids and a new theory about aliens
  • Jouko Ahvenainen on Data should improve services for ‘good’ and ‘bad’ customers

Archives

Popular Posts
  • Navigating regulation around data-driven telecoms
    Navigating regulation around data-driven telecoms
Recent Comments
  • JW on NOW Telecom and USTDA move forward on Philippines 5G plan
  • Elsa on Amazon buys thermal cameras for own use from blacklisted Chinese firm
Important pages
  • About Us
  • Marketing Services
  • Newsletters
  • Privacy Policy
  • Terms and Conditions of Service

© Disruptive.Asia 2023

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}