Blog

  • penetration testing in Malaysia

    How to Get a Penetration Test in Malaysia

    Build a Risk-Free System with Pen Testing Multiple cybersecurity studies have reported an exponential rise in digital threats in Malaysia.…

    by
  • penetration testing services in Singapore

    How Singapore Can Create a Risk Free Cyber Space

    With the reported breaches of SingHealth, Sephora, AXA Insurance, Uber, Red Cross, and many others, a spike in cyberattacks and…

    by
  • credential stuffing

    What Is Credential Stuffing and How Does It Work?

    Credential stuffing is the new and trending method of cyber attack wherein the attacker inserts lists of hundreds of millions of…

    by
  • Risk management

    6 Pillars of RMiT for Financial Institutions in Malaysia

    The Risk Management in Technology (RMiT), is policy guidance formalized by Bank Negara Malaysia (BNM), effective from January 2020. The…

    by
  • EGS-Marketing

    ISO 27001 to Improve your ISMS

    ISO 27001 to Improve your ISMS ISO 27001 is the internationally recognized best practice framework for an Information Security Management…

    by
  • managed security services

    4 of the Best Encryption Standards for MSSPs

    4 of the Best Encryption Standards for MSSPs A digitized world needs to secure its data and manage the risks…

    by
  • vulnerability assessment

    This is how you conduct VAPT remotely

    This is how you conduct VAPT remotely Vulnerability assessment and penetration testing (VAPT) are an absolute necessity for every organization,…

    by
  • identity and access management

    How to Build a Strong Identity and Access Management Policy

    How to Build a Strong Identity and Access Management Policy As an IT leader, it can be challenging to develop…

    by
  • EC-Council Announces Free Phishing-Protection Solution Amid The COVID-19 Outbreak

    EC-Council Announces Free Phishing-Protection Solution Amid The COVID-19 Outbreak OhPhish Helps Remote Workers and Businesses Fight Phishing Attacks – From…

    by
  • internet safety

    5 Steps to Basic Internet Safety

    5 Steps to Basic Internet Safety From viruses and worms to ransomware attacks, many cyber threats are hiding on the…

    by