<
>

How Tech & Talent Can Help CISOs Get Ahead of Daily Battles to Win the Information Security War

Author: Mike Campfield, Vice President of Security, ExtraHop Chief information security officers (CISOs) and the data security teams they manage, are vital to ensuring the protection of data for any organisation on the...

What it’s going to take to fix the security debt crisis

We’re on the brink of cyber security crisis. In recent years, news on data breaches, ransomware attacks or accidental exposures by employees have been hitting headlines almost daily. In Singapore, there were three major...

Firewall Best Practices to Block Ransomware

Authored: Aaron Bugal, Global Solutions Engineer, Sophos Today, getting pwned is the rule, rather than the exception. Organisations that have managed to avoid breach or cyberattack are few and far between, with no...

Three important predictions about cybersecurity we can extract from the world’s most ‘cybermature’ industries

Authored by: Mark Thomas, VP, Cybersecurity at Dimension Data Innovation and positive change often transpire during times of great adversity, and there’s no better example right now than the daunting threat we’re...

Is Disabling Your Macros Good Enough? Cybersecurity Experts Share Tips to Mitigate the Risk of Macro Based Attacks

Macros that are used in Microsoft Office documents, such as Word, Excel or PowerPoint, are convenient tools that allow users to use low-level programming to help automate repetitive tasks. However, the problem is that they are...

Stranger Danger: X-Force Red Finds 19 Vulnerabilities in Visitor Management Systems

By Daniel Crowley, Research Director, IBM X-Force Red   Automation is pervasive across our modern world and building lobbies are the latest place affected by the changes. The friendly receptionist or security guard is...

Phishing 101: A Deeper Look at Phishing Attacks and How to Protect Your Business

Cybercrime is becoming an increasingly lucrative business and threat actors are finding new, innovative ways to get their hands-on valuable data or breach into personal, corporate or government networks. Just like premeditated...

Can Cybercriminals Hack Blockchain?

It’s a simple question with a perhaps not so simple answer. One of the problems with the mainstream understanding of blockchain is that it is still synonymous with cryptocurrencies like Bitcoin or Ethereum. In a recent...

Too Many Companies are Overlooking Servers in their Endpoint Security Strategy

By Sumit Bansal, Managing Director of ASEAN and Korean at Sophos Earlier this year, it was revealed that Malaysia’s central bank, Bank Negara Malaysia fell victim to a cyber-attack where hackers attempted to steal...

Cryptojacking Explained

Authored by Tirath Ramdas (tirath@marklar.co), Principle Consultant at Marklar Marklar Consulting Cryptojacking is a portmanteau of cryptocurrency and hijacking. When the exchange price of Bitcoin spiked in mid-2017 (lifting...