<
>

What Businesses Need to Know About the Business Email Compromise Threat

Business email compromise (BEC) scams have been affecting organisations across multiple sectors in the Southeast Asian region. In Singapore alone, in 2018, the Singapore Police Force (SPF) has seen more than 200 reports of...

How The Ransomware Threat Is Becoming Trickier Smarter and More Dangerous Than Ever

The total number of cases of ransomware has dropped since the peak of the global WannaCry outbreak in 2017, but the attacks are becoming more serious. The 2020 Threat Report released by Sophos mentioned that “ransomware...

Puppet ventures in Cybersecurity, or are they?

When we heard the news that Puppet, a company that is primarily regarded as a DevOps tech company talking about security vulnerability and venturing into security and remediation, we decided to have a chat...

Fortinet Regional Director Talks Multi-Cloud Security

During the Malaysian leg of the Fortinet 361° Security Conference, we got the chance to have an informal interview with Sean Hong, Regional Director - Strategic Alliance Cloud at Fortinet, who shared his views on the...

Cylance to innovate more proactive cybersecurity measures with BlackBerry

Since completing the acquisition of Cylance in February 2019, BlackBerry Cylance is now a billion-dollar cybersecurity firm with the technology portfolio enterprises need to intelligently connect, protect and help build secure...

Managing Network and Security for Office 365

Office 365 helps organisations to reduce their hardware footprint and IT burden and shifts the responsibility for software reliability and availability over to Microsoft. The platform enhances productivity and collaboration by...

Knowing your attacker via CrowdStrike’s Threat Intelligence

The diverse cyber threat landscape continues to be a concern for businesses around the world. In Southeast Asia, organisations are facing the dilemma of understanding the various threat landscapes. In an exclusive interview...

Cybersecurity Needs To Be Both Reactive and Proactive

by Aron Raj, CSA Journalist Tangible and intangible costs are the two types of costs businesses face in a cybersecurity breach. The amount of time and energy organisations spend to communicate with their customers and...

Vehicle Tracking: What ever happened to privacy laws?

The age-old discussion on data privacy continues. Now, it has to do with smart cars. There is no doubt that new and modern cars will have more IoT devices.  And with all these technologies on board, it is most likely car...

Ethical Hacking: Is The Bounty Really Worth It?

At the recent Black Hat security conference in Las Vegas, tech giant Apple announced that it would pay ethical hackers more than US$1 million if they responsibly disclose dangerous security vulnerabilities to the company....