Posted on Leave a comment

Security is the new brand promise: Why trust is your startup’s only moat

If you build in Southeast Asia long enough, you learn something slightly uncomfortable. Trust isn’t something you earn later, after product-market fit or scale. It’s part of the product from day one. And one of the fastest ways to lose it is through a security incident.

That is why cybersecurity has become the trust layer across the digital economy. Because the moment trust breaks, growth breaks with it. Users do not separate “a technical incident” from “a company I can rely on”. Partners do not separate “a vendor problem” from “a risky platform”. Investors do not separate “a one-off breach” from a leadership team that did not think ahead.

From a PR and strategic communications perspective, this is the part many founders underestimate. In an environment where fake news spreads quickly, screenshots travel faster than context, and deepfakes can mimic a face and voice convincingly, cybersecurity is no longer just an IT concern. It’s reputation management in its most unforgiving form.

I have worked with more than 200 founders and CEOs over the past few years across growth stages, sectors, and markets. And I can tell you what trust loss looks like in real life. It’s not always dramatic. It’s the customer who quietly churns. The enterprise prospect who suddenly “pauses the conversation” and never comes back. It’s the investor who asks one extra diligence question, then ten, then decides to back a competitor. Trust usually leaks before it breaks.

Here is the hard part. We’re not only fighting criminals. We are fighting confusion. The World Economic Forum’s Global Risks Report 2025 once again ranks misinformation and disinformation as a top short-term risk, because it erodes shared reality and confidence in institutions, businesses, and information itself. In that environment, every security incident becomes a story problem as much as a technical problem. People ask, “Can I believe you?” long before they ask, “What happened?”

This is where cybersecurity and communications meet.

Also Read: Cybersecurity is not an IT problem: It is a trust architecture crisis

Most founders think crisis communications begins when something goes wrong. In reality, it begins much earlier, when you decide what not to prioritise. Security gaps often show up later as reputation problems. It compounds quietly, then collects interest at the worst possible moment.

The World Economic Forum’s Global Cybersecurity Outlook 2026 found that 77 per cent of respondents reported an increase in cyber-enabled fraud and phishing, and 73 per cent said they or someone in their network had been personally affected by cyber-enabled fraud. These cybercrime numbers aren’t distant concepts. Many have experienced it themselves or know people who have. So when a company downplays an incident, it lands poorly. People are already on edge, and their default setting is caution or suspicion.

Then there’s cost. IBM’s Cost of a Data Breach Report 2025 estimates the global average cost of a data breach at US$4.4 million. For startups, the bigger damage often isn’t just limited to financial. It’s distraction, lost momentum, morale hit and the reputational drag that follows you into every sales, investor or hiring conversation.

I remember working with a founder who had just secured a major partnership. The deal took months. Then a phishing incident hit a senior team member’s inbox. No customer funds were stolen, and the team contained it quickly. Technically, it was “handled”. Commercially, it hurt. The partner’s legal team requested additional assurance, the launch timeline slipped twice, and the founder spent weeks explaining and rebuilding confidence. The incident didn’t “break the company”, but it did disrupt the momentum.

Another founder I worked with faced a different kind of threat: a wave of fake social posts and forwarded messages claiming the company was insolvent and “being investigated.” It was untrue, but it was believable enough to spread. Initially, the team saw it as a PR annoyance until they realised it was really a trust and security problem. They tightened account access, verified official channels, and built a simple public “source of truth” page that stakeholders could refer to when rumours resurfaced. The communication worked because it was backed by operational discipline. If you don’t control your channels, you don’t control the story.

If you take one idea from this piece, it’s this: cybersecurity is credibility. It’s proof that you can be trusted with other people’s money, data and decisions.

So what does a communications-led approach to cybersecurity look like in practice?

  • First, treat trust as a design requirement, not a marketing promise. If onboarding requires sensitive data, your language must match the responsibility you are taking on. “We take your privacy seriously” isn’t a strategy. Instead, explain what you store, why you store it, and how users can protect themselves. Provide as much clarity as possible.
  • Second, communicate early when something happens. I have seen leadership teams freeze because they want certainty before they speak. Meanwhile, rumours fill the gap. A simple early update acknowledging what you know, what you don’t know yet, and what you’re doing next often builds more confidence than a polished statement released days later.
  • Third, rehearse the whole scenario. Who decides what is disclosed? Who speaks to customers? Who handles investors? Who monitors social channels? Who documents the timeline? Founders are often surprised that a “security incident” becomes a leadership endurance test. You are making decisions under pressure, with incomplete information, while your team looks to you for calm and direction. That is not a day to discover you don’t have a patted-down plan or an updated crisis playbook.

This matters even more now because scams are increasingly sophisticated. Across Asia in 2025, authorities reported large-scale operations involving deepfake technology used to impersonate trusted individuals and trick victims into transferring funds. Whether you’re running a fintech platform, e-commerce business, SaaS product, or marketplace, you’re operating in a region where fraud is organised and run at scale. Trust is about whether people feel safe using your products and services.

Also Read: How cybersecurity is becoming the trust layer that underpins Southeast Asia’s digital economy in 2026

Having been a startup co-founder myself, I’ve learnt that “winging it” when things go wrong often doesn’t work. Teams that invest in crisis preparedness and have more disciplined habits like clearer processes, faster internal escalation and better communication spend far less time later trying to explain themselves. Issues still happen. The difference is they’re able to handle them with confidence, not panic, while in damage control mode.

From a communications perspective, security is not just prevention and protection. It is leadership in action. It shows talent, customers, partners, and investors that you’re thinking ahead, building with care and taking responsibility seriously, even while the business is moving quickly.

If you’re thinking this sounds expensive, here’s the reality: you’re already paying, just in quieter ways. It shows up when customers hesitate to renew because something feels off, even if they can’t explain why. It shows up in small internal shortcuts taken because it’s faster. None of this is purely technical. It’s what leadership looks like in practice: what you prioritise, what you postpone, and what standards you set while you’re moving fast.

Founders often worry that talking about security will make users nervous. In my experience, silence or lack of information makes people far more uneasy. Clear, regular and consistent communication shows you’ve done the work, set boundaries, and respect what people have trusted you with.

This is why cybersecurity as a trust layer isn’t a tagline. It’s the discipline of protecting your reputation before you’re forced into defence mode. Because the real question isn’t whether something will go wrong. It’s whether people will still believe you when it does.

Editor’s note: e27 aims to foster thought leadership by publishing views from the community. Share your opinion by submitting an article, video, podcast, or infographic.

Enjoyed this read? Don’t miss out on the next insight. Join our WhatsApp channel for real-time drops.

The post Security is the new brand promise: Why trust is your startup’s only moat appeared first on e27.

Posted on Leave a comment

Cybersecurity and trust: A digital dawn for women in rural India 

The sun beats down intensely on green millet fields in Kadiri taluka, Andhra Pradesh, the ‘Sunrise State’. Lakshmi (name changed for privacy), a member of a village SHG (Self-Help Group), sits on a brightly coloured woven floor mat in the white-washed community kitchen where her group makes healthy millet snacks and packages them to be shipped to urban consumers in Bangalore, Visakhapatnam, Hyderabad and beyond. In her lap rests a mobile phone, its screen glowing faintly.

She tells me about the first time she used digital payments through India’s UPI network. “My fingers were shaking,” she recalls. “What if someone stole my money? I didn’t understand the messages that came to my phone.” Around her, her fellow SHG members laugh and agree, as they continue to shape millet flour, ghee, jaggery and nuts into evenly sized laddoos. Even as the hum of daily life continues, for Lakshmi and others like her, that small screen represents both opportunity and risk.

Across India’s villages, women are stepping into the digital world: selling their products and produce through WhatsApp groups, accessing government schemes online, and making and receiving payments through mobile wallets. Yet, their trust in technology is fragile, often shaken by fraud calls, phishing messages, or identity theft. Stories of PAN (Income Tax ID) numbers being misused and bank accounts being emptied are warning whispers circulating among the women gathered in the community kitchen and the Panchayat (village council) centre.

When trust meets technology

In Nalanda, Bihar, the rhythmic click-clack of a handloom resonates through the family home of Amrit and Geeta Devi (names changed for privacy). The husband and wife take turns weaving Bawan Buti saris, a traditional handloom cotton saree characterised by 52 (bawan) woven motifs (buti). Geeta’s shy smile radiates warmth even through the camera lens of the smartphone she is holding up to join a video conference call along with a group of village women entrepreneurs from across Bihar.

“A man messaged me, saying I could get a subsidy if I shared my Aadhaar (India’s National ID) details. I almost believed him. But I remembered what we learned in our training session before. ‘Never share personal information and ID details with strangers!’ I deleted the message and blocked the number.”

That action may have saved her livelihood. Geeta had attended sessions on using digital tools like WhatsApp for Business, UPI, and more along with the other women entrepreneurs in the cohort. With the support of their local Panchayat Mukhiyas (leaders), women were trained to use the mobiles safely, recognise fraud, and secure their finances. “I protected my family and my business”, she says, with deserved pride.

Her SHG coordinator, Rekha Devi (name changed), also an entrepreneur, adds: “We learned that our phone is like our home. We wouldn’t leave our door unlocked at night. In the same way, we shouldn’t leave our phone open to anyone.”

Also Read: Cybersecurity is not an IT problem: It is a trust architecture crisis

Digital access to safety tools

Back in Andhra Pradesh, women like Lakshmi increasingly face cyber harassment and threatening messages from unknown numbers. In the past, most stayed silent, too afraid to approach the police. But now, many in her village know about the mobile citizen services and the Suraksha app, launched by the state government.

Cyber awareness campaigns are conducted in the district by the police, local authorities, volunteers and NGOs. Chandra (name changed), a volunteer with a local NGO, says, “We go to villages and tell women: if you face fraud, don’t be silent. Report it. The system is here to protect you.”

Grassroots trust networks

In Bihar, local government facilities often double as classrooms. At a Didi Adhikaar Kendra (a one-stop support centre for women) in Muzzafarpur district, women gather with notebooks and phones, listening intently as one of their own, trained in cyber safety, explains how to spot suspicious links.

In Andhra Pradesh, SHG women act as intermediaries, translating technical advice into simple, local language instructions. “We don’t say ‘phishing’ or ‘malware,’” says Seeta, a high school graduate and active SHG member in Telugu, the local language. “We say, ‘Don’t click on strange messages.’ That is easier for people to understand.”

Lakshmi adds, “When women teach each other, it’s very helpful. We believe advice more when it comes from someone we know.”

Trust grows when women see familiar faces like neighbours, local officials, and fellow SHG members leading the way. It transforms cybersecurity from a distant concept into a living reality.

Also Read: Cybersecurity: The evolution from digital safeguard to economic governance

Lessons for the future

  • Cybersecurity is empowerment: For women like Geeta and Lakshmi, digital safety is not just about avoiding fraud; it is about protecting livelihoods and personal dignity.
  • Trust is community-led: Programs succeed when they embed cybersecurity into community structures, not just individual training.
  • Policy meets practice: Andhra Pradesh’s institutional support and Bihar’s grassroots training together show emerging holistic models, where top-down infrastructure is paired with bottom-up empowerment.

Cybersecurity and digital trust are not only technical issues, but they are also deeply human. For women at the bottom of the economic pyramid, trust in digital tools can unlock new opportunities, strengthen livelihoods, and foster confidence in the digital future.

Protecting them from cyber risks ensures that digital inclusion becomes a pathway to empowerment, not vulnerability. We must all recognise that Cybersecurity may start with protecting data, but it ends up protecting dreams. For millions of women in India’s villages, those dreams deserve to be safe.

Editor’s note: e27 aims to foster thought leadership by publishing views from the community. Share your opinion by submitting an article, video, podcast, or infographic.

Enjoyed this read? Don’t miss out on the next insight. Join our WhatsApp channel for real-time drops.

The post Cybersecurity and trust: A digital dawn for women in rural India  appeared first on e27.

Posted on Leave a comment

Quantum ambitions go global, and Southeast Asia wants in

Quantum computing has shifted from laboratory curiosity to a national strategic imperative. The “Quantum Computing Report 2026” by Tracxn documents multi-year, multi‑billion-dollar government commitments worldwide designed to accelerate research, build industrial capabilities, and mitigate security risks.

From the US’s National Quantum Initiative to China’s sweeping funding programmes and Europe’s Quantum Flagship, public missions are catalysing private-sector activity and shaping international collaborations.

Also Read: The Quantum gold rush is becoming an infrastructure race

In Asia, India, Japan, and South Korea have already announced major plans. Southeast Asia, meanwhile, is carving a distinct, if heterogeneous, path into the quantum landscape.

Global playbook: investment, partnerships, and security

Most national strategies combine three pillars:

  • Large-scale funding for hardware and software research.
  • Public‑private partnerships to translate laboratory advances into deployable systems and applications.
  • Workforce programmes and standards development, particularly for post‑quantum cryptography and secure communications.

These pillars reflect shared priorities: technological sovereignty, industrial competitiveness, and national security. Governments are not merely funding research; they’re building ecosystems (testbeds, standards bodies, talent pipelines, and procurement pathways) to ensure domestic industries capture value and critical infrastructure remains resilient.

Asia beyond the big three: a growing quantum interest

India, Japan, and South Korea have outlined ambitious trajectories: India’s National Quantum Mission, Japan’s multi‑billion yen commitment linking semiconductors with quantum R&D, and South Korea’s sizeable investment plan through 2035. These efforts create regional demand for partnerships, skilled workers, and specialised infrastructure — all opportunities for Southeast Asian nations to participate and specialise.

Southeast Asia’s emerging quantum landscape

Southeast Asia is not monolithic. Countries vary in research capacity, industrial bases, and national priorities. Yet several patterns are emerging:

Singapore: Acting as the regional hub

Singapore stands out as a clear regional quantum hub. Its strengths — stable funding mechanisms, world-class universities (e.g., NUS, NTU), advanced data‑centre infrastructure, and an active ecosystem of startups and multinational R&D labs — make it attractive for quantum testbeds and regional headquarters. Government agencies (A*STAR, NRF) and industry players are investing in quantum research, quantum-safe cryptography trials, and talent programmes. Singapore’s regulatory clarity and connectivity position it as a base for cross-border partnerships and pilot deployments in finance and telecommunications.

Malaysia and Thailand: building on electronics and manufacturing

Malaysia and Thailand, with their strong electronics and semiconductor ecosystems, are well placed to contribute to quantum hardware supply chains, cryogenics components, and packaging technologies. National research institutes and universities are increasingly integrating quantum modules into engineering curricula, and both countries are exploring cluster development to attract quantum-startup investments and OEM partnerships.

Also Read: Quantum computing market surges as companies shift focus to revenue

Indonesia and Vietnam: scale, talent, and localised applications

Indonesia and Vietnam possess large, youthful populations and rapidly expanding tech sectors. Their comparative advantage may lie in talent development, software-focused quantum applications (optimisation, logistics, finance), and cloud‑based access models that lower barriers to entry for local companies. National labs and universities are beginning to offer quantum programming courses and hackathons to seed developer communities.

The Philippines: research-to-industry pathways

The Philippines has strengths in IT services and a growing academic research base. Government initiatives and partnerships with foreign research centres could accelerate applied quantum research aimed at the services sector — for example, quantum‑inspired algorithms for supply‑chain optimisation or fintech applications.

ASEAN-level opportunities and challenges

  • Collaboration over competition: ASEAN can amplify individual member strengths through shared infrastructure (regional quantum testbeds), common certification standards for quantum-safe cryptography, and joint talent programmes. A coordinated approach would reduce duplication and attract global partners seeking regional scale.
  • Connectivity and data sovereignty: Southeast Asia’s role as a digital hub depends on secure communications. Quantum key distribution (QKD) pilots and post‑quantum cryptography (PQC) adoption must account for cross‑border data flows, undersea cable architectures, and national regulations on encryption. Governments will need to harmonise policy to avoid fragmentation that hinders regional trade in data‑dependent services.
  • Financing and talent gaps: While top-tier nations can deploy large budgets, many Southeast Asian states face budgetary constraints. Creative financing — blended public‑private funds, regional bonds, and international partnerships — can help. Equally important is scaling education: short targeted Masters programmes, industry‑led apprenticeships, and regional fellowships can supply the engineers, physicists, and software developers required.

Sectors to watch in Southeast Asia

  • Finance and insurance: Quantum‑safe cryptography, portfolio optimisation, and risk modelling are near-term priorities for regional banks and reinsurers eager to future‑proof data.
  • Logistics and manufacturing: Quantum‑inspired heuristics can improve routing and scheduling in congested supply chains; quantum hardware could later accelerate materials discovery relevant to regional industries.
  • Telecommunications: National carriers and regional exchanges may pilot QKD for backbone links or critical government communications.
  • Energy and materials: Universities and startups can partner with local industry to use quantum simulations for battery, catalyst, and semiconductor materials research.

Also Read: Quantum computing’s double-edged sword could threaten cybersecurity

Strategic autonomy, partnerships, and geopolitics

Southeast Asian governments will balance strategic autonomy with international collaboration. Partnering with the US, EU, Japan, China, or India offers access to capital, equipment, and talent, but also introduces geopolitical considerations. Careful procurement policies, transparency in partnerships, and multi‑partner strategies can help nations reap benefits while managing risks.

Policy recommendations for Southeast Asia

  • Prioritise capacity building: Invest in education, regional fellowships, and exchange programmes to grow a quantum-ready workforce.
  • Create regional public goods: Shared testbeds, standards harmonisation for PQC, and a regional quantum data governance framework would lower entry barriers.
  • Target sectoral pilots: Focus public funding on high-impact pilots (finance, energy, logistics) to demonstrate near-term value and attract private capital.
  • Encourage industry clusters: Incentivise manufacturing and supply‑chain capabilities tied to quantum hardware through tax incentives and grants.
  • Promote open collaboration: Facilitate academic and industry partnerships across ASEAN, and maintain transparent, multi-lateral foreign partnerships.

Conclusion

National quantum missions are reshaping the global technology landscape; Southeast Asia will not be a passive audience. By combining targeted public investment, regional cooperation, and pragmatic partnerships, countries in the region can capture value from quantum technologies — first through software and cloud access models, then by deepening hardware and manufacturing capabilities. The race is global, but the route to relevance for Southeast Asia is clear: specialise where comparative advantages exist, pool resources regionally, and build the human capital that will turn government missions into local economic opportunity.

Also Read: How quantum computing moved from components to applications in 2024

Quantum advantage, after all, depends as much on people and policy as on qubits.

The post Quantum ambitions go global, and Southeast Asia wants in appeared first on e27.

Posted on Leave a comment

Echelon Philippines 2025 – Partnering for Growth: How great founders and VCs build together

Echelon Philippines 2025 featured a fireside chat between Puiyan Leung, Partner at Vertex Ventures SEA & India, and Thaddeus Koh, Co-Founder and Programs Director of e27, exploring the mindset founders need to navigate entrepreneurship.

Leung highlighted that successful founders balance optimism about what is possible with a practical understanding of how to achieve it, grounded in a clear personal reason for choosing the entrepreneurial path. She also stressed the importance of openness—being willing to connect with investors and peers to learn continuously.

Building relationships during good times, not only in moments of difficulty, helps founders identify the right investors partners.

The post Echelon Philippines 2025 – Partnering for Growth: How great founders and VCs build together appeared first on e27.

Posted on Leave a comment

Echelon Philippines 2025 – SaaS 2.0 in SEA: Vision and reality with Sprout’s Patrick Gentry

At Echelon Philippines 2025, a fireside chat featuring Patrick Gentry, Co-Founder and CEO of Sprout Solutions, and moderated by Artie Lopez, Co-Founder and Startup Coach at Brainsparks, explored the evolving future of SaaS in Southeast Asia.

Gentry described “SaaS 2.0” as a shift from traditional subscription models toward outcome-driven software, where companies charge based on features and results rather than fixed subscriptions. While businesses will always rely on software, the delivery model is rapidly changing with cloud infrastructure and AI shaping the next generation of products.

He also noted that SaaS in the Philippines remains nascent, with limited exposure to global best practices for building and scaling software businesses.

The post Echelon Philippines 2025 – SaaS 2.0 in SEA: Vision and reality with Sprout’s Patrick Gentry appeared first on e27.