<
>

Cylance to innovate more proactive cybersecurity measures with BlackBerry

Since completing the acquisition of Cylance in February 2019, BlackBerry Cylance is now a billion-dollar cybersecurity firm with the technology portfolio enterprises need to intelligently connect, protect and help build secure...

Managing Network and Security for Office 365

Office 365 helps organisations to reduce their hardware footprint and IT burden and shifts the responsibility for software reliability and availability over to Microsoft. The platform enhances productivity and collaboration by...

Knowing your attacker via CrowdStrike’s Threat Intelligence

The diverse cyber threat landscape continues to be a concern for businesses around the world. In Southeast Asia, organisations are facing the dilemma of understanding the various threat landscapes. In an exclusive interview...

Cybersecurity Needs To Be Both Reactive and Proactive

by Aron Raj, CSA Journalist Tangible and intangible costs are the two types of costs businesses face in a cybersecurity breach. The amount of time and energy organisations spend to communicate with their customers and...

Vehicle Tracking: What ever happened to privacy laws?

The age-old discussion on data privacy continues. Now, it has to do with smart cars. There is no doubt that new and modern cars will have more IoT devices.  And with all these technologies on board, it is most likely car...

Ethical Hacking: Is The Bounty Really Worth It?

At the recent Black Hat security conference in Las Vegas, tech giant Apple announced that it would pay ethical hackers more than US$1 million if they responsibly disclose dangerous security vulnerabilities to the company....

Maintaining the Pace with the Ever-Evolving Threat Landscape

Cybercriminals continue to wreak havoc to businesses. Advancements in tech has allowed for more sophisticated attacks, pushing cybersecurity service providers to try to come up with more nuanced methods of protection. Globally,...

Zoom security flaw allows hackers to turn on webcam remotely

Zoom boasts over four million users and 750,000 companies around the world opting to choose Zoom for their video conferencing needs. When it was revealed that the Mac version of Zoom videoconferencing service had a severe...

Bug Bounty Programs: How ethical are they?

Bug bounty programs are an industry best practice, implemented by both public and private sector organisations across industries and regions. A large number of organisations have implemented bug bounty programs including...

Envy Formula Helping Malaysian Organisations Advance Their Cybersecurity Transformation

CSA recently had an interesting chat with the Chief Technology Officer of Envy Formula Sdn Bhd, Capt. Muhammad Azmir Bin Muhammad Dan, who shared his views and experience on the local cybersecurity domain in...