Author: melissatang
Enough. Are We Implementing AI In Cyber Through Rose-Tinted Glasses
There is no denial that Artificial Intelligence (AI) is playing a significant role in fighting cybercrime across multiple industries, with many businesses utilising AI to secure their organisations. From enhanced detection and analysis of both attempted and new threats to picking up of behavioural abnormalities within an organisation’s network and endpoints, and down to flagging…
First Mover’s Perspective – Taking On The Common Criteria Certification Journey
Today more than ever, systems vulnerabilities, design flaws, and backdoors are the main reasons behind the surge in cybersecurity incidents. Governments and enterprises have to constantly review, upgrade and change their security policies and systems to protect their high-value data, sensitive information, revenue, intellectual property and reputation. As a leading player in cybersecurity and information…
Gearing Up For Cybersecurity Resilience
Relying on IT departments to manage a cybersecurity incident is a thing of the past. Senior leaders of a large national Banking, financial services and insurance (BFSI) organisation took steps to proactively develop a Cybersecurity Incident Response Plan (CIRP), involving multiple IT and non-IT departments and incorporating the CIRP as part of the broader Business…
Empowering Cyber Readiness
With the aim of building a digitally inclusive society, developing secure and reliable digital infrastructure is of priority to the Information and Communication Technology Agency (ICTA) of Sri Lanka. Call for a National Security Operation Centre (NSOC) In 2016, ICTA of Sri Lanka, together with Sri Lanka CERT|CC, embarked on a significant and important initiative to…
60 Secs Tech Views: Data Protection On-The-Go
Our world’s slimmest Storage Encryptor Mobile, has clinched both theCES Innovation Award 2019 and the Singapore Good Design Award 2019 for outstanding design. In this 60s video series with Li Danlin, Manager of Crypto Products, uncover the story of our Storage Encryptor Mobile. Watch the video below for the full content.
60 Secs Tech Views: En Route To An Effective Security Operation Centre
Organisations are constantly facing issues to fill in cybersecurity expertise for people, processes and technologies to stay ahead of cyber-attacks. The inability has compounded their challenge in maintaining an effective Security Operations Centre (SOC). It is critical to keep up with the ever-changing cyber landscape and an effective SOC is designed with an open platform…
Cryptography – The Unsung Hero For Safe Digital Access, Transactions And Operations
In this thought leadership piece by Chia Boon Quee, Chief Cryptography Officer, Cybersecurity, ST Engineering, we will uncover the world of cryptography. In his course of over 20 years in information security, he has led the technical team on network security products, served as a lead security architect and technical lead for many classified projects…
Securing Critical Information Infrastructures And Systems
At one of Asia’s largest real estate groups, estate managers had the onerous task of managing multiple properties across a global portfolio of commercial buildings, industrial parks and residential estates. Even with the help of building management systems (BMS) to handle everything from access controls and elevators to heating, ventilation and air conditioning systems, overseeing…
Bios Shield Use Cases Infographics
Endpoints are the weakest link in the security chain. According to a recent report, more than 70%1 of breaches originate at the endpoint and 42%1 of endpoints are unprotected at any given time. With a dispersed workforce out of office, endpoint security has become an urgent necessity for organisations. A full understanding of your enterprise is crucial…
6 Essential Steps To Secure Your Data
In today’s digital age, cyber threats are not only on the rise but also evolving at a rapid pace. Data security is extremely vital for any organisation, irrespective of its size. A breach in data can easily lead to a loss in business continuity, trust, profits and more. In the infographics below, we have listed…