<
>

Zoom security flaw allows hackers to turn on webcam remotely

Zoom boasts over four million users and 750,000 companies around the world opting to choose Zoom for their video conferencing needs. When it was revealed that the Mac version of Zoom videoconferencing service had a severe...

Bug Bounty Programs: How ethical are they?

Bug bounty programs are an industry best practice, implemented by both public and private sector organisations across industries and regions. A large number of organisations have implemented bug bounty programs including...

Envy Formula Helping Malaysian Organisations Advance Their Cybersecurity Transformation

CSA recently had an interesting chat with the Chief Technology Officer of Envy Formula Sdn Bhd, Capt. Muhammad Azmir Bin Muhammad Dan, who shared his views and experience on the local cybersecurity domain in...

The Need for a Security First Approach to Cloud in the Face of Escalating Cyber Threats

While the Oracle OpenWorld Asia 2019 was mainly focused on the future of technology, there was also a large emphasis on growing issues or concerns that come hand in hand with technological advancements, especially those related...

Forcepoint Leading the Charge in Human-Centric Cybersecurity

Two of the most overused sayings in IT today have to be "data is the new oil" and "people are the weakest link in the cybersecurity chain". There is, of course, a lot of truth in these sayings, and in the eyes...

Closing the Gap in Cybersecurity Spending

Cybersecurity threats continue to be a significant concern for most businesses in various industries. There have been many approaches by cybersecurity providers to find out the problem organisations are facing and how to deal...

Staying Resilient In The Face of Agile Cyber Attacks: CSA Interviews McAfee CTO for APAC

In light of the recently released McAfee Labs 2019 Threats Predictions Report, which went in depth into how the threat landscape will look like in the coming year, CSA was able to get in touch with Ian Yip, McAfee’s CTO for...

CSM-ACE 2018: Kaspersky Lab Interview - Challenging the Cybersecurity Industry Towards Better Transparency

The cyber threat landscape has become a lot more sophisticated in this age of digital revolution. While interconnectivity and rapid data exchange have revolutionised business processes and models, according to Yeo Siang Tiong,...

CSM-ACE 2018: FireEye Interview – ASEAN Countries Need to Place Greater Focus on Resourcing Their Cyber Defences

During the CyberSecurity Malaysia Awards, Conference & Exhibition (CSM-ACE 2018), CSA was given the opportunity to interview FireEye’s Senior Technical Director for the Asian region, Steve Ledzian, who was one of the...

Are Your Conversations On Messaging Apps Secure?

Concerns regarding issues such as censorship, privacy and escalating cyber threats have meant that organisations are putting added measures in place to make their communication platforms more secure and private. In order to...