<
>

Cryptojacking Explained

Authored by Tirath Ramdas (tirath@marklar.co), Principle Consultant at Marklar Marklar Consulting Cryptojacking is a portmanteau of cryptocurrency and hijacking. When the exchange price of Bitcoin spiked in mid-2017 (lifting...

Safeguarding connected devices in the age of digital transformation

By Goh Chee Hoh, Managing Director, Trend Micro Malaysia   We've all heard about the inevitability of digital transformation. Technologies such as Internet of Things (IoT), big data analytics, blockchain, and mobile...

Cryptojacking Explained

With the dawn of cryptocurrency, a new form of hijacking has emerged. A way to steal power and resources from a computer to be used for bitcoin mining. Cryptojacking, can be done on any device that is able to browse the internet....

Cyber Safety Explained

Cyber Safety refers to the safe and responsible use of ICT.   Cyber Safety is not just about keeping systems and data safe, but its about using IT systems responsibly and treating other individuals and their data with...

5 Security Threats Looming in 2018

By Nigel Tan, GSI Business Development, Asia Pacific, IBM Security CYBERSECURITY became a household name in Malaysia in 2017 due to the record number of personally identifiable information that were exposed through major data...

Moving to Cloud 101: Go hard or go home? Also, is security just a bother?

2016 is the tipping point of enterprise cloud adoption. It has fast tracked through being a buzzword, to becoming a serious strategy for enterprise. However, there still lies many challenges - many companies are doing more...

Insider Threats Explained

Insider threats are security threats to business information systems that come from people within their own organisation. The source of an insider threat comes from existing employees, former employees that retain systems access,...

Access Management Explained

Access management (AM) grants an operator control over identifying, tracking and managing authorized or specified users' access to a system, application or any IT instance. The process will cover all policies, processes,...

Privilege Creep Explained

In an IT organisation, each employee has their own set of privileges which they need to perform their duty. One such privilege may be the right to access a particular system resource like file folders or documents, reports or...