Blog
How can we define the futures of Cybersecurity
September 7, 2022
0 Comment
By Vishal Shah
Defining the future of cybersecurity is indeed like writing a script for a sci-fi movie. What we presently understand as cybersecurity may not be relevant in future. The known modus operandi of cybercrime like phishing, identity theft, ransomware, DDoS attacks, and data breaches will be easily mitigated by integrated and
How to address IoT security challenges?
September 6, 2022
0 Comment
By Prayukth K V
My first association with IoT was way back in 2016. We were then working on developing an IoT-based solution for monitoring blood banks. Security was on the table but it was not a big priority for many businesses back then as I found out from my interactions with many IoT
Security Think Tank: Good procurement practices pave the way to app security
September 6, 2022
0 Comment
By Petra Wenham
Making and keeping a company’s IT infrastructure safe and secure from unauthorised intrusions or malicious actions has always been challenging. With the increased use of cloud computing, coupled with a need to keep developing new functions at an ever-increasing pace through the use of agile technologies, maintaining good security has become
Pen Testing: A Crucial Tool for Preventing Cyberattacks in Supply Chain Organizations
September 5, 2022
0 Comment
By Jay Paz
Cyberattacks are impacting suppliers at record rates. Attacks on supply chain organizations increased by 51% in the second half of 2021, with the number continuing to grow. Cybercriminals are targeting suppliers not only to steal their information, but also to search for and pinpoint holes in their partners, thus spreading the damage
Research shows importance of people-centric security
September 5, 2022
0 Comment
By Shannon Williams
In August, it was reported that Singapore faced more cyber attacks in 2021 with key malicious activities such as phishing, ransomware, and botnet drones taking centre stage. With all these scams around, cybersecurity firm Proofpoint says individuals and organisations need to be more cognisant of such malicious attacks, and build