<
>

Alyssa Herrera, bug bounty hunter at 16 years old

While most teenagers today are busy playing Fortnite, Instagramming or hanging out at malls with friends, 16-year-old Alyssa Herrera spends her time hunting for bugs. The full-time bug bounty hunter and security researcher based...

Biometric Usage To Gain Greater Prominence In 2020 and Beyond

Biometric authentication has long been about providing fast, secure access, but as we move into the data-driven age, this technology also has to take into account tightening privacy requirements. Yesterday, CSA caught up with the...

What Businesses Need to Know About the Business Email Compromise Threat

Business email compromise (BEC) scams have been affecting organisations across multiple sectors in the Southeast Asian region. In Singapore alone, in 2018, the Singapore Police Force (SPF) has seen more than 200 reports of...

How The Ransomware Threat Is Becoming Trickier Smarter and More Dangerous Than Ever

The total number of cases of ransomware has dropped since the peak of the global WannaCry outbreak in 2017, but the attacks are becoming more serious. The 2020 Threat Report released by Sophos mentioned that “ransomware...

Puppet ventures in Cybersecurity, or are they?

When we heard the news that Puppet, a company that is primarily regarded as a DevOps tech company talking about security vulnerability and venturing into security and remediation, we decided to have a chat...

Fortinet Regional Director Talks Multi-Cloud Security

During the Malaysian leg of the Fortinet 361° Security Conference, we got the chance to have an informal interview with Sean Hong, Regional Director - Strategic Alliance Cloud at Fortinet, who shared his views on the...

Cylance to innovate more proactive cybersecurity measures with BlackBerry

Since completing the acquisition of Cylance in February 2019, BlackBerry Cylance is now a billion-dollar cybersecurity firm with the technology portfolio enterprises need to intelligently connect, protect and help build secure...

Managing Network and Security for Office 365

Office 365 helps organisations to reduce their hardware footprint and IT burden and shifts the responsibility for software reliability and availability over to Microsoft. The platform enhances productivity and collaboration by...

Knowing your attacker via CrowdStrike’s Threat Intelligence

The diverse cyber threat landscape continues to be a concern for businesses around the world. In Southeast Asia, organisations are facing the dilemma of understanding the various threat landscapes. In an exclusive interview...

Cybersecurity Needs To Be Both Reactive and Proactive

by Aron Raj, CSA Journalist Tangible and intangible costs are the two types of costs businesses face in a cybersecurity breach. The amount of time and energy organisations spend to communicate with their customers and...