CIOAdvisor Apac

  • Home
  • Vendors
  • News
  • Conference
  • Whitepapers
  • Newsletter
  • Subscribe
  • About Us
  • Specials

  • Menu
      • Ad Management
      • Application Security Testing
      • Artificial Intelligence
      • BPO
      • Contact Center
      • Data Analytics
      • Deep Learning
      • Digital Marketing
      • Digital Transformation
      • Disaster Recovery Services
      • Disinfection and Sanitization
      • E-Invoicing
      • Ecommerce
      • Govt Tech
      • HubSpot
      • Human Resource
      • ICT
      • IoT
      • Laser and Photonics
      • Leadership Development
      • Logistics
      • Machine Learning
      • Marketing Technology
      • Mobile Application
      • Parking Management
      • Payment And Card
      • SDN
      • Telecom
  • Digital Transformation
  • Logistics
  • IoT
  • Payment And Card
  • Artificial Intelligence
Specials
  • Specials

  • Ad Management
  • Application Security Testing
  • Artificial Intelligence
  • BPO
  • Contact Center
  • Data Analytics
  • Deep Learning
  • Digital Marketing
  • Digital Transformation
  • Disaster Recovery Services
  • Disinfection and Sanitization
  • E-Invoicing
  • Ecommerce
  • Govt Tech
  • HubSpot
  • Human Resource
  • ICT
  • IoT
  • Laser and Photonics
  • Leadership Development
  • Logistics
  • Machine Learning
  • Marketing Technology
  • Mobile Application
  • Parking Management
  • Payment And Card
  • SDN
  • Telecom
×
#

CIO Advisor APAC Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Advisor APAC

Subscribe

loading
  • Home
  • News
Editor's Pick (1 - 4 of 8)
left
What Organizations are Mistaken about Cybersecurity?

Osman Faiz, CIO, Standard Chartered Bank (Singapore)

Technology and Business Conscience Collision

Winston Benedict, CIO, Dentsu Aegis Network ANZ

Innovation and Change, the Challenge of Getting It to Stick

Ross Forgione, CIO, Johnson Winter & Slattery

Security: From the Back Room to the Boardroom

Bret Arsenault, VP & CISO, Microsoft Corporation

Digital Warfare

Dr. Dale A. Lambert, Chief, Cyber and Electronic Warfare Division, Defence Science and Technology (DST) Group, Department of Defence

What has changed in the last 20 years?

Ajoy Ghosh, Chief Information Security Officer, icareNSW

Game of Pawns: Security lessons from the latest HBO hack

Alex Manea, Chief Security Officer, BlackBerry

Importance of Security

Adam Cartwright, Head of Cyber Security, ANZ

right

THANK YOU FOR SUBSCRIBING

The Software Supply Chain and Advanced Malware: Threat to APAC

CIOAdvisor Apac | Monday, October 28, 2019
Tweet

Cyber AttacksBecause of its growing reliance on technological advancements and the Cloud platform, cyberspace has become a lucrative target for the cybercriminals. A massive amount of investment is being made to secure the cyberspace. Statista reported that 179 million records of data breaches were exposed in the U.S. Not only the U.S, but every region faces this threat of cybercrime.

APAC region has witnessed a regal growth in technological advancement and has evolved into a real competitor to the giants. According to MIT Technology Review Insights, 51 percent of big houses are investing in this region. This constant growth is the center of attraction for cybercriminals. Every sector including small and medium businesses, education, healthcare, and finance suffered due to cyber attacks. The massive cyber attacks in the IT systems of Singapore's public healthcare and the massive data breach in Malaysian telcos showed the vulnerabilities of the APAC region. In 2019, it will be a major concern of this region to have secure cyberspace.

According to the prediction of Frost and Sullivan, in the APAC region, the expense on IoT will be $79 billion by 2020. This huge investment points toward the future growth of risk factors. The hackers will be more interested in the underlying cloud infrastructure to affect a larger area. Singapore has shown immense interest in IoT to build the projected smart nation.

In 2019, it is expected that attacks through advanced malware will be increased because this advanced malware cannot be detected quickly and cannot be removed easily. The Philippines has witnessed Emotet. This year, the industries have to solve the issues related to username and password.

The software supply chain is an area of attraction for cybercriminals. Hackers try to exchange a legitimate software update to a malicious version, and this leads to the attacks on the computer. 2018 witnessed such attacks, and proper steps are needed this year to combat it.

In 2019, the APAC region has to keep in mind the growing complexities of cyber attacks and has to address the ever-increasing cyber threats adequately. Business leaders have to provide the employees with proper knowledge of the ever-increasing threats because ignorance is no longer bliss.

Check this out: Top Forcepoint Consulting Services Companies

tag

Cyber Threats

review

Featured Vendors

  • MVI Technologies: Innovative, Future-proof Financial and Payment Switching
    MVI Technologies: Innovative, Future-proof Financial and Payment Switching
  • DATAMARK: Process Driven Solutions in Action
    DATAMARK: Process Driven Solutions in Action
  • IMACREA: Shaping the Future of Teleworking
    IMACREA: Shaping the Future of Teleworking
  • PuzzleBox BPO, Inc.: A Hybrid Platform for Customer Support and Sales Empowerment
    PuzzleBox BPO, Inc.: A Hybrid Platform for Customer Support and Sales Empowerment
ON THE DECK

Read Also

Safeguarding Quality through Proactive Risk Management

Cultivating a Culture of Agility: Nurturing Adaptability for Organizational Success

Governance for Smarter KPIs: Enhancing Performance Measurement

Embracing the Irreplaceable Human in Business and Beyond

Leveraging Gamification for Deeper Financial Engagement

Generative AI: The Game-Changer Automates Marketing For The Retail Industry

Loading...

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

Copyright © 2025 CIO Advisorapac. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap

follow on linkedinfollow on twitter
This content is copyright protected

However, if you would like to share the information in this article, you may use the link below:

https://www.cioadvisorapac.com/news/the-software-supply-chain-and-advanced-malware-threat-to-apac-nwid-1404.html