Build a Risk-Free System with Pen Testing Multiple cybersecurity studies have reported an exponential rise in digital threats in Malaysia. Some experts estimate the increase to be a staggering 82.5%…
Find Out More
With the reported breaches of SingHealth, Sephora, AXA Insurance, Uber, Red Cross, and many others, a spike in cyberattacks and cybercriminal activities could be clearly seen in Singapore since 2017.…
Find Out More
Credential stuffing is the new and trending method of cyber attack wherein the attacker inserts lists of hundreds of millions of breached usernames and passwords into a system. As its physically…
Find Out More
The Risk Management in Technology (RMiT), is policy guidance formalized by Bank Negara Malaysia (BNM), effective from January 2020. The proposed guidelines are applicable to all the financial institutions listed…
Find Out More
ISO 27001 to Improve your ISMS ISO 27001 is the internationally recognized best practice framework for an Information Security Management System (ISMS). This is a framework of policies and procedures…
Find Out More
4 of the Best Encryption Standards for MSSPs A digitized world needs to secure its data and manage the risks that come with it. Encryption methods such as SHA256, SHA512,…
Find Out More
This is how you conduct VAPT remotely Vulnerability assessment and penetration testing (VAPT) are an absolute necessity for every organization, big or small. Companies cannot afford to compromise on following…
Find Out More
How to Build a Strong Identity and Access Management Policy As an IT leader, it can be challenging to develop policies and procedures for an organization. The key policies pertaining…
Find Out More
EC-Council Announces Free Phishing-Protection Solution Amid The COVID-19 Outbreak OhPhish Helps Remote Workers and Businesses Fight Phishing Attacks – From the Editors at Cybercrime Magazine ALBUQUERQUE, N.M., March 23, 2020…
Find Out More
5 Steps to Basic Internet Safety From viruses and worms to ransomware attacks, many cyber threats are hiding on the massive world wide web. This means that there is only…
Find Out More
Legal vs. Ethical Aspects of Information Assurance and Security Title 18 of the United States Code (USC) section 1030 outlines a variety of fraud and related activities deemed illegal under…
Find Out More
What is the role of the Federal Government in Critical Infrastructure Protection? Over the last few years, critical infrastructure protection (CIP) has become a more prominent topic of interest for…
Find Out More
Will technology overload result in the loss of human touch? In a world of relentless connectivity to phones, tablets, and other electronic devices, it can be challenging to differentiate between…
Find Out More
4 Cyber Threats Ruling the New Decade – 2020 With merely three months into our new decade, a reflection of cyber threats, both past, present, and future, will inevitably cross…
Find Out More
How to Manage Event in SOC What is SIEM and how does it work Security incidence and event management contribute to 1.6% of the total $120 billion economies of the…
Find Out More