<
>

Vehicle Tracking: What ever happened to privacy laws?

The age-old discussion on data privacy continues. Now, it has to do with smart cars. There is no doubt that new and modern cars will have more IoT devices.  And with all these technologies on board, it is most likely car...

Ethical Hacking: Is The Bounty Really Worth It?

At the recent Black Hat security conference in Las Vegas, tech giant Apple announced that it would pay ethical hackers more than US$1 million if they responsibly disclose dangerous security vulnerabilities to the company....

Maintaining the Pace with the Ever-Evolving Threat Landscape

Cybercriminals continue to wreak havoc to businesses. Advancements in tech has allowed for more sophisticated attacks, pushing cybersecurity service providers to try to come up with more nuanced methods of protection. Globally,...

Zoom security flaw allows hackers to turn on webcam remotely

Zoom boasts over four million users and 750,000 companies around the world opting to choose Zoom for their video conferencing needs. When it was revealed that the Mac version of Zoom videoconferencing service had a severe...

Bug Bounty Programs: How ethical are they?

Bug bounty programs are an industry best practice, implemented by both public and private sector organisations across industries and regions. A large number of organisations have implemented bug bounty programs including...

Envy Formula Helping Malaysian Organisations Advance Their Cybersecurity Transformation

CSA recently had an interesting chat with the Chief Technology Officer of Envy Formula Sdn Bhd, Capt. Muhammad Azmir Bin Muhammad Dan, who shared his views and experience on the local cybersecurity domain in...

The Need for a Security First Approach to Cloud in the Face of Escalating Cyber Threats

While the Oracle OpenWorld Asia 2019 was mainly focused on the future of technology, there was also a large emphasis on growing issues or concerns that come hand in hand with technological advancements, especially those related...

Forcepoint Leading the Charge in Human-Centric Cybersecurity

Two of the most overused sayings in IT today have to be "data is the new oil" and "people are the weakest link in the cybersecurity chain". There is, of course, a lot of truth in these sayings, and in the eyes...

Closing the Gap in Cybersecurity Spending

Cybersecurity threats continue to be a significant concern for most businesses in various industries. There have been many approaches by cybersecurity providers to find out the problem organisations are facing and how to deal...

Staying Resilient In The Face of Agile Cyber Attacks: CSA Interviews McAfee CTO for APAC

In light of the recently released McAfee Labs 2019 Threats Predictions Report, which went in depth into how the threat landscape will look like in the coming year, CSA was able to get in touch with Ian Yip, McAfee’s CTO for...