<
>

Reinforcing Data Protection in the Digital Age

Authored by: Dato’ Ts. Dr. Haji Amirudin Bin Abdul Wahab FASc In the near future, the world’s most valuable resource may no longer be oil but data. If harnessed and analysed, data can drive good decision-making...

WhatsApp Privacy Policy Update Delay Won't Stop The Exodus To Telegram and Signal and Here Is Why

An update published on WhatsApp's blog pages on the 15th of January announced they are delaying the privacy policy update that has caused millions of people to seek alternatives to their messaging platform. The blog starts...

The Three Core Pillars of Data Security

Your legacy cybersecurity approaches are probably failing now in securing your ever-growing data – and it is time to acknowledge it. Outdated approaches to data security may now be obsolete as we transition into a new...

Your Transition to Quantum-safe Security Has to Start Now!

“With Great Power Comes Great Responsibility" This line might be taken from a Spiderman movie, but it makes it no less true. Technology provides us with this "use of power moral dilemma" on a...

Forging A United Alliance Against Global Cyber Threats

Authored by: Dato’ Ts. Dr. Haji Amirudin Bin Abdul Wahab FASc   The COVID-19 global pandemic has become a catalyst for cyberattacks. Cybercriminals are intensifying their attacks at an alarming pace, exploiting the...

How Do You Align Your Business Goals with Your Cybersecurity Strategy?

As many organisations today are undergoing a digital transformation, cybersecurity vulnerabilities are also emerging. At the same time, businesses, in general, are experiencing disruptive changes in their operations and systems,...

The Top Threats Financial Institutions Should Protect Against

Large or small, there is no single financial institution that is not vulnerable to cyber-attacks. In fact, financial organisations are becoming a prime target for cybercriminals due to the large amounts of highly sensitive data,...

Raccoon Malware Kill Chain Added to BreakingPoint Attack Campaigns

Authored by: Phil Trainor, Director, Security Solutions, Keysight Technologies Keysight’s Application and Threat Intelligence (ATI) research team released a new type of cyber-attack campaign this month. BreakingPoint...

The Only Holiday Present I Want is All-New Passwords

Authored by: Morey Haber, CTO/CISO at BeyondTrust   I recently took an inventory of all the passwords that I use for business and personal usage. The total was well over a hundred and I believe I can safely assume that...

What You Should Know About the Evolving Emotet Threat

As employees continue working from home, organisations are having concerns about the security of their employees, especially when it comes to their working devices and network. While both network and devices can be protected by...