TelcoNews Asia - Telecommunications news for ICT decision-makers
Asia
Asian Edition · 2026

The Ultimate Guide to Privileged Access Management

A curated Asian edition of TechDay news, analysis, interviews, reviews, job moves, and related resources for Privileged Access Management (PAM).

What to know about Privileged Access Management

Privileged Access Management (PAM) is a critical component of cybersecurity focused on securing, controlling, and monitoring privileged accounts and access within an organisation. Privileged access refers to elevated permissions that allow users to perform sensitive operations in IT systems, networks, cloud environments, and applications. Managing these privileges effectively helps prevent insider threats, credential theft, and external cyberattacks that can lead to severe data breaches or operational disruptions.

The stories tagged with Privileged Access Management highlight industry developments such as new product features, security enhancements, integrations with cloud services, AI-powered automation, and partnerships aiming to strengthen PAM strategies. They emphasize challenges organisations face in maintaining visibility and control over privileged accounts, especially as hybrid cloud architectures, DevOps workflows, and remote work increase the complexity of access management.

Reading about Privileged Access Management on our blog provides insights into best practices for implementing least privilege principles, just-in-time access, multi-factor authentication, and zero trust security models. The content also underscores regulatory compliance considerations and the evolving threat landscape, including ransomware and insider misuse. By exploring these stories, readers can learn how PAM solutions adapt to emerging technologies and cyber risks to safeguard critical infrastructure and sensitive information effectively.

Asian Privileged Access Management News

Regional stories with direct local relevance

Analyst Insights

Research and market analysis connected to Privileged Access Management

Expert Columns

Interviews

Interviews and video coverage from the network

Recent Privileged Access Management News

Heng Leong Hang adopts CyberArk platform for enhanced cybersecurity
Advanced Persistent Threat Protection

Heng Leong Hang adopts CyberArk platform for enhanced cybersecurity

Taiwanese retail giant, Heng Leong Hang, enhances cyber defence with the integration of CyberArk's Identity Security Platform into its cyber security strategy to protect core systems and customer data.

Wed, 20th Mar 2024

Singapore firms suffer cybersecurity inertia as attacks take heavy toll
Cybersecurity strategy

Singapore firms suffer cybersecurity inertia as attacks take heavy toll

Despite Singapore's technological advancements, research from CyberArk reveals 38% of firms rarely update their security strategies even after cyber attacks.

Mon, 5th Mar 2018

Tenable launches Hexa AI to automate exposure fixes
IT service management

Tenable launches Hexa AI to automate exposure fixes

Security teams can now automate exposure fixes and reporting as Tenable makes Hexa AI generally available to Tenable One customers.

Yesterday

Tenable launches Hexa AI with Anthropic partnership
Security Operations Centres

Tenable launches Hexa AI with Anthropic partnership

Security teams face faster exploit windows as Tenable rolls out AI-driven remediation tools to customers using its Exposure Management Platform.

Yesterday

Keycard launches access platform for multi-agent apps
Identity and Access Management

Keycard launches access platform for multi-agent apps

It aims to curb over-privileged AI systems by giving each agent its own identity and limiting access to specific tasks and sessions.

Last week

Keeper Security adds approval controls to KeeperPAM
Security Operations Centres

Keeper Security adds approval controls to KeeperPAM

Approval-based access controls now give security teams tighter oversight of privileged accounts as AI agents expand the attack surface.

Last week

Microsoft patches 137 flaws, including critical Netlogon
Software Updates

Microsoft patches 137 flaws, including critical Netlogon

Domain controllers face urgent patching after a Netlogon flaw was rated 9.8, with no privileges or user interaction needed for exploitation.

Last week

SailPoint launches Agentic Fabric to secure AI agents
Chief Technology Officers

SailPoint launches Agentic Fabric to secure AI agents

The new platform aims to close a governance gap as autonomous software agents increasingly access sensitive systems and data without oversight.

Last week

Netskope launches AgentSkope AI agents for security teams
Productivity

Netskope launches AgentSkope AI agents for security teams

It aims to reduce alert fatigue for security teams, with one beta customer processing 14 million daily alerts in minutes instead of hours.

Last week

APAC firms struggle as AI identities swell, survey finds
Physical Security

APAC firms struggle as AI identities swell, survey finds

Pressure is mounting on security teams as non-human identities and AI tools outpace controls, leaving APAC firms exposed to misuse.

This month

OpenAI launches GPT-5.5-Cyber for vetted defenders
Firewalls

OpenAI launches GPT-5.5-Cyber for vetted defenders

Vetted security teams will get fewer refusals on authorised tasks as OpenAI tightens access around its most permissive cyber model.

This month

Genetec urges tighter identity controls for security systems
Data Protection

Genetec urges tighter identity controls for security systems

AI-driven attacks are exposing weak passwords on cameras and access controls, prompting calls for stricter governance across physical security systems.

This month

Recast adds Intune tools for hybrid endpoint teams
Hybrid Cloud

Recast adds Intune tools for hybrid endpoint teams

IT teams can now handle more hybrid endpoint tasks in one place as Recast widens Right Click Tools support for Intune and Entra ID.

This month

Keeper Security launches Agent Kit for AI coding agents
Virtualisation

Keeper Security launches Agent Kit for AI coding agents

It lets developers use AI coding tools without pasting sensitive credentials into prompts, reducing the risk of secrets leaking into logs or source control.

This month

Qualys warns cloud risk now stems from identity design
Data breach

Qualys warns cloud risk now stems from identity design

Poor identity controls and slow remediation are leaving cloud users exposed as attacks now exploit trust relationships rather than one flaw.

Last month

Keeper launches Verify Mode to block phishing logins
Data breach

Keeper launches Verify Mode to block phishing logins

Enterprise administrators can now warn staff before passwords are pasted into fake sites, as phishing remains a major cause of breaches.

Last month

The Gentlemen becomes second most active ransomware group
Malware

The Gentlemen becomes second most active ransomware group

Check Point Research says a better affiliate payout is helping the gang spread fast, with more than 320 claimed victims since mid-2025.

Last month

Critical Microsoft vulnerabilities double in yearly report
Software Updates

Critical Microsoft vulnerabilities double in yearly report

Critical Microsoft flaws surged as Azure, Dynamics 365 and Office saw big jumps, even though total vulnerabilities fell 6% in 2025.

Last month

Sysdig report says cloud security shifts to machine speed
Digital Transformation

Sysdig report says cloud security shifts to machine speed

Shorter attack windows are pushing cloud teams towards automated defence, as Sysdig says AI-driven threats now outpace manual response.

Last month

Keeper boosts endpoint privilege governance for firms
Chief Technology Officers

Keeper boosts endpoint privilege governance for firms

Large firms can now curb standing admin rights more tightly, as Keeper adds approvals, expiry checks and audit trails across endpoints.

Last month