Cybersecurity Company Malaysia

Insights

Insights That Keep You Ahead of Cyber Threats

How do attackers really think? What does a new vulnerability actually mean for your business?

The AKATI Sekurity Insights Blog is where our experts answer the hard questions. We publish frontline analysis and forensic discoveries to give IT professionals and business leaders the practical, technical, and strategic knowledge they need to build a stronger defense.

Joanna Woon SC. Joanna Woon SC.

Legal Alert: The Rise of "Death by AI" Liability

2026 Legal Threat Report: Death by AI Claims

Legal claims involving AI safety failures are predicted to exceed 2,000 by 2026. The legal standard is shifting from "software glitches" to "gross negligence," holding executives personally liable for product defects. To mitigate this, organizations must implement Human-in-the-Loop protocols and maintain Model Explainability logs to prove reasonable care in court.

Read More
Joanna Woon SC. Joanna Woon SC.

"Seeing is No Longer Believing": The Identity Crisis of 2026

2026 Identity Security Report: The Shift to Continuous Authentication

By 2026, real-time deepfakes will render standard video verification obsolete, with human detection rates falling to 24.5%. To combat this, organizations are adopting Continuous Authentication, which uses behavioral biometrics (keystroke dynamics, mouse movements) to verify identity throughout a session rather than just at login. This shift addresses the "Identity Crisis" where traditional "snapshot" verification fails against AI-generated impostors.

Read More
Joanna Woon SC. Joanna Woon SC.

The $5 Billion Budget Line: Preparing for AI Governance Publishing

2026 AI Governance Report: The $5 Billion Gap

Fragmented global regulations (EU AI Act, US State Laws) are projected to drive $5 billion in compliance spending by 2027. This guide explains why organizations must shift from "Responsible AI" to "Defensible AI"—a legal posture requiring immutable audit trails. It outlines practical steps to uncover "Shadow AI" using existing CASB and Microsoft Purview tools and establishes frameworks for an AI Bill of Materials (AIBOM).

Read More
Joanna Woon SC. Joanna Woon SC.

The Enemy Within: When AI Agents Go Rogue

2025 Insider Threat Report: AI Agents

The definition of "Insider Threat" has expanded to include Autonomous AI Agents, contributing to 40% of all threat operations in 2025. Attackers utilize Prompt Injection to hijack trusted agents for data exfiltration and privilege escalation. Defense strategies must now include Just-Enough Access (JEA) and Unified Behavioral Analytics (UEBA) for non-human identities.

Read More
Joanna Woon SC. Joanna Woon SC.

How to Integrate AI Risk into Your Existing Cybersecurity Programme

This article explains a more effective strategy: normalizing AI risk. Instead of building new walls, learn how to expand your existing cybersecurity framework to cover AI. We provide a 3-step plan to deconstruct AI threats, map them to your current controls, and prove that you are more prepared for the AI era than you realize.

Read More