
OT ISAC – Singapore Operational Technology Information Sharing and Analysis Summit 2024
We had the privilege of speaking with Steven Sim, Chair of the OT-ISAC Executive Committee, during the recent summit in Singapore.

We had the privilege of speaking with Steven Sim, Chair of the OT-ISAC Executive Committee, during the recent summit in Singapore.
AI video solutions are transforming many business sectors, driving profitability and operational efficiency. With increasingly reliable tools for detection and verification, this technology is poised to go much further. By

A complex, challenging, and changing security landscape means a difficult, demanding, and dynamic operating environment, particularly in constrained fiscal conditions. The cost of doing business continues to climb, and budgets,

It’s a question that has fascinated tech professionals and the general public for decades: will artificial intelligence (AI) be a friend or a foe to the humans\ that develop it?

The generative artificial intelligence (AI) debate has engrossed the software industry and beyond ever since ChatGPT’s reveal in late 2022. For a year and a half, companies and individuals have

The Asia Pacific is the fastest-growing regional market for Generative AI where it is estimated to reach USD110 billion by 2030. According to a study published by the Infosys Knowledge
RISK & CONTROLS | CYBER SECURITY | INTELLIGENCE & COUNTER INTELLIGENCE | ELECTRONICS | ANALYTICS | TECHNICAL DESIGN 2024 SERIES ADVANCEMENTS & APPLICATIONS FOR CRITICAL INFRASTRUCTURE PROTECTION & HIGH SECURITY
| PRESENTS | Industry networking Presents industry networking SPACE AS A NATIONAL MISSION: INDUSTRY COLLABORATION AND CURRENT Launch Capabilities in Australia Technology Safeguards Agreement AUKUS UK Space Bridge QUAD Thursday

We speak with Joel Lisk, Research Associate (Space and Regulation) at the Jeff Bleich Centre for Democracy and Disruptive Technologies at Flinders University who provides expert analysis on the Australia’s new US space tech agreement.

Imagine a successful cyberattack against your organization. What does it look like? Maybe it involves a fiendishly clever piece of social engineering—a convincing lure that catches the recipient off guard.