Infrastructure Cybersecurity is Wanting
Just over six months ago, President Trump signed into law the Cybersecurity and Infrastructure Security Agency Act (CISA), created to better protect the nation’s critical infrastructure from physical...
View ArticleAchieving Warp Speed: Making Sure Your Security Infrastructure is Up to Snuff...
When James Kirk found his beloved starship Enterprise unresponsive at a moment in which he and his crew faced seemingly hopeless odds, he would press the communication button on his captain's chair...
View ArticleA Privacy-Driven Security Culture
It’s hard to go a day without seeing news of a data breach affecting thousands (to even millions of people). What additional skill sets can cybersecurity pros arm themselves with to tackle the new...
View ArticleThe CISO Speaks: Scott Niebuhr of The Aerospace Corp. on Cyber Security...
As if hiring cyber security staff wasn't challenging enough, now this: According to a Robert Half International survey, two-thirds of IT decision-makers plan to hire full time employees in the second...
View ArticleRSAC 2019 APJ Ambassador Q&A: Mihoko Matsubara
In cybersecurity, more knowledge means more protection. But let’s be honest, staying smart is a lot of work. It means going out of your way to meet experts and find credible resources. Or, you could...
View ArticleBen's Book of the Month: Review of "Practical Cloud Security: A Guide for...
It was not that long ago, that if you wanted to build a data center with a 1,000 servers and 200 terabytes of storage; it would take about a year or so of planning to get such a design into...
View ArticleA.I. Powered Malware: Will Asia Pacific Be Ground Zero?
For several years in a row now, Asia Pacific has topped the list of the most malware exposure of any region in the world, and Singapore alone saw an almost 200 percent-increase of malware detections...
View ArticleRSAC 2019 APJ Ambassador Q&A: My-Ngoc Nguyen
Next up, hear from RSAC APJ Ambassador, My-Ngoc Nguyen: This will be your first time speaking at RSAC APJ – what are you most looking forward to? I’m looking forward to sharing my knowledge and...
View ArticleAnnouncing the 2020 RSA Conference Theme: Human Element
These are evolving times in cybersecurity. We’re constantly inundated with new strategies and approaches meant to stem threats. New technologies like artificial intelligence and machine learning...
View ArticleRSAC 2019 APJ Ambassador Q&A: Magda Chelly
And finally, hear from RSAC APJ Ambassador, Magda Chelly: This will be your second year speaking at RSAC APJ—what are you most looking forward to? Facilitating the discussions around important and...
View ArticleMuch energy, inspiration and deep dives into security at RSA Conference 2019 APJ
Thirteen new security measures will be rolled out later this year in the Singapore public sector to protect personal data after a spate of breaches in the Republic in the past year. These new measures...
View ArticlePhishing drills critical to better cyber resilience
Phishing sent through emails is the most common form of cyber attack because it is easy to pull off. And the high level of digital connectivity in every business today, opens organisations to attacks....
View ArticleConsumer surveillance good but risks lurk in the background
Increasingly many homes have installed surveillance cameras for safety reasons. In the past, footage is kept on the home owner’s hard disk for seven days after which it is deleted, new data is...
View ArticleSocial engineering effective in cyber threats
To protect a company’s crown jewels from a cyber attack, a security expert will have to think and act like a hacker. Sometimes, he or she must realise that the first point of attack is not digital,...
View ArticleDeepfakes is an emerging threat vector
Cybersecurity faces a new emerging form of threats: deepfakes where images, video and audio can be digitally doctored to scam people and organisations. Remember the video of a seemingly impaired...
View ArticleCybersecurity industry can contribute its expertise to cyberspace peace
Estonia, a small nation in Europe, suffered the first nationwide cyberattack in 2007 when a DDoS attack crippled several key websites including those of banks, Parliament, government ministries and...
View ArticleFor efficiency and effectiveness, threat detection needs a structure
Security strategies can be planned in several ways. One is through threat detection where the objective is to find anomalies, analyse their threat level, and determine what mitigation actions may be...
View ArticleWith Proposed British Airways, Marriott Fines, That GDPR Iceberg Is Getting a...
When French regulators cited Europe's fledgling General Data Protection Act in fining Google $57 million earlier this year for playing fast and loose with consumer data in personalizing ads, experts...
View ArticleRSA Conference 2019 APJ a success with thought provoking and useful topics
Content, content, content. That’s what made the recently concluded RSA Conference 2019 APJ special and successful. Thumbs up for the content checked all the right boxes: informative, thought...
View ArticleCorporate Mobile Security Isn’t Cutting It
Let’s get right to the point immediately. It’s almost as if corporations have blinders on regarding some aspects of cybersecurity, including, in particular, mobile security and its vulnerable apps....
View ArticleThe DevSecOps Journey: Achieving Security at Speed and Scale
Before DevOps dramatically transformed the application development process, a typical application development scenario went like this: Application developers created their application, system or code...
View ArticleThe CISO Speaks: Tim Callahan on How Aflac Is Approaching Application...
Securing systems, data and processes at the application level is all the rage these days. With reports predicting that the market for application security products will experience a compound annual...
View ArticleBen's Book of the Month: Review of "Firewalls Don't Stop Dragons: A...
Variations on a Theme is a superb piece by Johannes Brahms. Borrowing on that, In Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies (Apress 978-1484238516), author...
View ArticleChanging the Conversation—Leverage Business Priorities to Manage Cyber Risk
Organizations are increasingly required to meet evolving cybersecurity regulations and implement new technologies to protect critical assets and keep the business running—but how can they keep up? As...
View ArticleLessons of All Types Abound in Aftermath of Massive Capital One Breach
This was not your grandfather's bank data hack. Well, not that your grandfather would know what a bank data hack is, but if he did, he wouldn't have recognized the one that hit Capital One last month....
View Article
More Pages to Explore .....