<
>

Posts in Cyber Safety

InspireTech’s EasiShare transforms security in workplaces

Author: Heoh Chin Fah, Managing Director, Katana Logic InspireTech made its way down to Malaysia to reach out and share more about its solution that will change the way your...

Why Businesses Need to Implement the Cyber Resilience Lifecycle

As organisations continue to invest in cybersecurity protection, many still do not have a proper cyber resilience strategy. Besides the lack of awareness, one possible drawback is that a lot of...

CSA Executive Guide Managing Email Cyber Risks supported by Barracuda

Cybersecurity Asean’s (CSA) Executive Guide aims to take a complex, technical subject and explain it in “executive level” terms. By executive level, we mean that we...

Salesforce Experiences a 15 Hour Outage, A Stark Reminder That Cloud is Not Immune To Failure

By any standards, 15 consecutive hours of unplanned downtime in a modern-day production system is not acceptable. When those 15 hours are with one of the world’s largest SaaS providers, the...

Tenable Adds New Cybersecurity Features to its Cyber Exposure Platform

Tenable®, Inc., the Cyber Exposure company, today unveiled new innovations to its Cyber Exposure analytics capabilities in Tenable Lumin™. These innovations leverage machine learning to...

Scammers target job seekers with sophisticated money-stealing scheme

Kaspersky Lab experts detected a blast of sophisticated spam emails in the first quarter of 2019, featuring fake job-offers that seemed to come from HR-recruiters in large corporations that...

Domain Spoofing Explained

What is Domain Spoofing? Domain spoofing is a form of online fraud or phishing technique whereby cybercriminals impersonate a company or its employees using a fake domain that appears...

A Cyber Resilient Approach in the Digital Economy

The digital economy continues to expand around the globe. As a result, more businesses are exploring newer areas in their digital journey. The advancements in technology especially in analytics and...

DON’T LET STOLEN PASSWORDS MAKE YOU EASY PREY FOR CYBER CRIMINALS

By Morey Haber, CTO & CISO at BeyondTrust   If you were a cyber criminal, imagine what you could do with a cache of stolen passwords. Perhaps you might launch a brute force attack against...

Business Email Compromise Explained

What is Business Email Compromise? Business Email Compromise (BEC) refers to fraudulent emails used by cybercriminals to imitate the identity of another party or person in order to scam or...

Pages

Subscribe to RSS - Cyber Safety