RSA Conference 2019 APJ a success with thought provoking and useful topics

|
Content, content, content. That’s what made the recently concluded RSA Conference 2019 APJ special and successful. Thumbs up for the content checked all the right boxes: informative, thought provoking, useful and handy. Tech conferences I have attended frequently focussed on new products and their technical specs. The big difference with ... Read More

Deepfakes is an emerging threat vector

|
Cybersecurity faces a new emerging form of threats: deepfakes where images, video and audio can be digitally doctored to scam people and organisations. Remember the video of a seemingly impaired Senator Nancy Pelosi that went viral a few months ago on social media? It was a deepfake video, probably created ... Read More

Cybersecurity industry can contribute its expertise to cyberspace peace

|
Estonia, a small nation in Europe, suffered the first nationwide cyberattack in 2007 when a DDoS attack crippled several key websites including those of banks, Parliament, government ministries and the media. Since then, cyberattacks against governments as well as private enterprises have been growing in prominence Asia has also fallen ... Read More

For efficiency and effectiveness, threat detection needs a structure

|
Security strategies can be planned in several ways. One is through threat detection where the objective is to find anomalies, analyse their threat level, and determine what mitigation actions may be required. For this process to be effective, there needs to be a structure. Two security experts from Sony, Charles ... Read More

Consumer surveillance good but risks lurk in the background

|
Increasingly many homes have installed surveillance cameras for safety reasons. In the past, footage is kept on the home owner’s hard disk for seven days after which it is deleted, new data is re-written over it. With the advent of consumer cloud in recent years, the footage can be stored ... Read More

Phishing drills critical to better cyber resilience

|
Phishing sent through emails is the most common form of cyber attack because it is easy to pull off. And the high level of digital connectivity in every business today, opens organisations to attacks. Every Chief Information Security Officer has reason to fear a phishing attack because through it, cybercriminals ... Read More

Social engineering effective in cyber threats

|
To protect a company’s crown jewels from a cyber attack, a security expert will have to think and act like a hacker. Sometimes, he or she must realise that the first point of attack is not digital, but physical. Social engineering can be used to do this, said Paula Januszkiewicz, ... Read More

Much energy, inspiration and deep dives into security at RSA Conference 2019 APJ

|
Thirteen new security measures will be rolled out later this year in the Singapore public sector to protect personal data after a spate of breaches in the Republic in the past year. These new measures aim to make illegally extracted data more unusable, to detect anomalous data traffic and to ... Read More