Build a Risk-Free System with Pen Testing Multiple cybersecurity studies have reported an exponential rise in digital threats in Malaysia.…
With the reported breaches of SingHealth, Sephora, AXA Insurance, Uber, Red Cross, and many others, a spike in cyberattacks and…
Credential stuffing is the new and trending method of cyber attack wherein the attacker inserts lists of hundreds of millions of…
The Risk Management in Technology (RMiT), is policy guidance formalized by Bank Negara Malaysia (BNM), effective from January 2020. The…
ISO 27001 to Improve your ISMS ISO 27001 is the internationally recognized best practice framework for an Information Security Management…
4 of the Best Encryption Standards for MSSPs A digitized world needs to secure its data and manage the risks…
This is how you conduct VAPT remotely Vulnerability assessment and penetration testing (VAPT) are an absolute necessity for every organization,…
How to Build a Strong Identity and Access Management Policy As an IT leader, it can be challenging to develop…
EC-Council Announces Free Phishing-Protection Solution Amid The COVID-19 Outbreak OhPhish Helps Remote Workers and Businesses Fight Phishing Attacks – From…
5 Steps to Basic Internet Safety From viruses and worms to ransomware attacks, many cyber threats are hiding on the…