
Articles
-
2 weeks ago |
cdotrends.com | Winston Thomas
Every time you’ve been placed on hold, you’ve unknowingly contributed to one of the most valuable — and trapped — datasets in the digital economy. Buried in the digital vaults of call recording companies like Nice, Verint, and Genesis lie billions of hours of raw human conversation, locked away in proprietary formats like medieval texts awaiting translation. The voice is primal.
-
2 weeks ago |
cdotrends.com | Winston Thomas
Here’s a familiar scenario: The chief executive officer talks up a cutting-edge AI pilot and makes it an imperative, gets the boardroom excited about why AI is the future and why the organization needs to get on the bandwagon, and then gets the budget approval. That was how it looked during the last Chief Digital and Data Officer Asia Summit 2024. In the latest edition — Chief Digital and Data Officer Asia Summit 2025 — the mood had turned somber.
-
2 weeks ago |
cdotrends.com | Winston Thomas
The financial services industry is evolving fast. And so is fraud. Take “friendly fraud.” A staggering 42% of Gen Z consumers now engage in it – deliberately disputing legitimate transactions they actually made. It’s not a glitch in the system; it’s now part of a new financial landscape where AI-powered attacks and digitally-native dishonesty are becoming the norm across Asia Pacific’s banking sector.
-
2 weeks ago |
cdotrends.com | Winston Thomas
When it comes to financial services security, Southeast Asia is at the epicenter. Rapid digital adoption has opened up security holes, a fragmented regulatory landscape allows threat actors to hide, and is where sophisticated identity fraud syndicates call home. Financial services players in Southeast Asia also face another challenge.
-
2 weeks ago |
cdotrends.com | Winston Thomas
Is the modern enterprise cybersecurity apparatus an expensive illusion? Companies spend billions annually on perimeter defenses, threat detection systems, and security operations centers — yet breaches persist with alarming regularity. The truth is that most security strategies suffer from a fatal flaw: they are designed to stop attacks but are unprepared to investigate them when attacks succeed.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →