<
>

Darktrace OT Threat Finds: Detecting an Advanced ICS Attack Targeting an International Airport

Authored by: David Masson, Director of Enterprise Security, Darktrace   As Industrial Control Systems (ICS) and traditional IT networks converge, the number of cyber-attacks that start in the corporate network before...

Ransomware an Evolving Threat to OT

Authored by: Galina Antova, Co-Founder and Chief Business Development Officer of Claroty As information technology (IT) and operational technology (OT) converge, ransomware becomes a growing concern for those tasked with...

Credential Stuffing Explained

Credential stuffing is a cyber attack technique whereby an attacker uses compromised credentials or login information on different services in order to gain unauthorized access into a user’s other accounts. When...

Addressing Cybersecurity Threats As Remote Working Arrangements Take Hold

Authored by: Ta Loong Gan, Managing Director, Barco SEA and Vice President ProAV, Barco APAC The business world's increased reliance on technology in response to the COVID-19 pandemic has had the advantage...

How COVID-19 Is Impacting Security

Authored by: Rena Chua, Bug Bounty Advisor, HackerOne COVID-19 has thrown the entire world into chaos. Due to the pandemic, organisations worldwide were forced to go digital with their product offerings and services....

You’re Not as Smart as You Think You Are: Phishing with Covid-19 as Bait

Authored by: Phil Trainor, Director, Security Solutions, Keysight Technologies   Targeting people, instead of systems, is the fastest and most results-driven method of hacking. The reason for this is due to the...

A Knife in the Back(up): The Next Big Target for Ransomware

Authored by: Sheena Chin, Managing Director, ASEAN, Cohesity Over the past few years, one of the most important developments in the cyber-attack landscape has been the evolution of ransomware. In 2017, attackers...

The Phishing Test: Does This Email Look Suspicious to You?

Authored by: Justin Loh, Country Director, Singapore, Veritas Technologies LLC The global pandemic has accelerated digital transformation. As new work environments are being created and an increasing number of employees work...

Top Cloud Security Challenges in 2020

Authored by: Trisha Paine, Head of Cloud Marketing Programs, Check Point Software Technologies Migration to the cloud has accelerated recently, especially in light of the COVID-19 outbreak. This global shift towards a...

Biometrics is Necessary, but Not Sufficient

Authored by Denis Kalemberg, CEO at Airome Technologies Signing financial transactions in digital banking channels has always been done under special supervision. It's hardly surprising: authentication and payment...