Skip to content
Home » Uncategorized

Uncategorized

Harvest Now, Decrypt Later (HNDL): Data Hoarding and Retention, Delayed Impact of Data Breaches, and Cryptographic Mapping

Lim May-Ann, Jan 2026 TL;DR• What is the threat of harvest now, decrypt later?• What are some practices today that leave us vulnerable to HNDL? Particularly in the Asia Pacific region?• What can we do… Read More »Harvest Now, Decrypt Later (HNDL): Data Hoarding and Retention, Delayed Impact of Data Breaches, and Cryptographic Mapping

Securing Our Interconnected Future in 2025 and Beyond: Tackling Supply Chain Cybersecurity in Southeast Asia

Feb 2025by Lim May-Ann The geopolitical developments in 2025 have cast global spotlight again on the critical role that supply chain security plays in global commerce and economic growth. After decades of globalization and optimization,… Read More »Securing Our Interconnected Future in 2025 and Beyond: Tackling Supply Chain Cybersecurity in Southeast Asia

Digital Authentication and Trust Mechanisms as the Foundation for Digital Public Infrastructure (DPI) in Southeast Asia

Jan 2025by Lim May-Ann Southeast Asia’s public sector and citizen services have undergone rapid digital transformation in the last decade, fuelled by the expansion and adoption of cloud computing services in the region. Governments and… Read More »Digital Authentication and Trust Mechanisms as the Foundation for Digital Public Infrastructure (DPI) in Southeast Asia