Category: Cybersecurity

  • Quantum Computing – The Evolution Of Cryptography

    Quantum Computing – The Evolution Of Cryptography

    Cryptography has long served the foundation in addressing security concerns ranging from privacy, authentication, confidentiality, trust, to system integrity and fair play. Cryptographic algorithms and key strengths are regularly reviewed against computing powers in the near future, re-assessing if cryptanalysis could be achieved over a shorter period of time.  Adversaries or bad actors have been…

  • How To Harness The Power Of AI In Cybersecurity

    How To Harness The Power Of AI In Cybersecurity

    The pandemic has accelerated the use of technology as businesses find new ways to remain resilient, but it has also inevitably led to a rise in cyber-attacks – a trend that is expected to intensify with the advent of more emerging technologies such as 5G and the Internet of Things (IoT). What this means is…

  • Approach To Effective OT And IT Cybersecurity

    Approach To Effective OT And IT Cybersecurity

    Cyber-attacks have expanded beyond the realm of IT into the physical world of Operational Technology (OT). The global trend of cyber-attacks on OT systems has intensified and will only get worse. In a survey by Ponemon Institute, 90% of OT enterprise respondents reported suffering at least one damaging cyberattack between 2017 and 2019. In sector-specific…

  • 5 Tips To Keeping Cyber Safe While Working From Home

    5 Tips To Keeping Cyber Safe While Working From Home

    With more people working from home due to the COVID-19 situation, organisations and IT teams need to ensure employees are cyber safe. That means providing them with cybersecurity best practices, tools and resources to protect their data and devices. Here’s sharing 5 essential cybersecurity tips to keep yourself cyber safe in the current work-from-home environment.…

  • Conquering The Cyber Unknown

    Conquering The Cyber Unknown

    In the years leading up to 2018, there has been an increase in the frequency as well as the sophistication in the cyber-attacks launched at organisations. Most companies by now would have invested in some sort of cybersecurity technology, if not poured in millions to protect them against cybersecurity breaches. However, cybersecurity breach is still…

  • Women In Technology: Building Tomorrow’s Solutions Today

    Women In Technology: Building Tomorrow’s Solutions Today

    Holding nine patents and with countless journal papers to her name, Vrizlynn Thing is a respected figure in a field dominated mostly by men. Vrizlynn helms the Cybersecurity Strategic Technology Centre, at ST Engineering. She leads and drives technology innovation, catalyses a portfolio of solutions and products, and provides thought leadership in the area of…

  • Enough. Are We Implementing AI In Cyber Through Rose-Tinted Glasses

    Enough. Are We Implementing AI In Cyber Through Rose-Tinted Glasses

    There is no denial that Artificial Intelligence (AI) is playing a significant role in fighting cybercrime across multiple industries, with many businesses utilising AI to secure their organisations. From enhanced detection and analysis of both attempted and new threats to picking up of behavioural abnormalities within an organisation’s network and endpoints, and down to flagging…

  • First Mover’s Perspective – Taking On The Common Criteria Certification Journey

    First Mover’s Perspective – Taking On The Common Criteria Certification Journey

    Today more than ever, systems vulnerabilities, design flaws, and backdoors are the main reasons behind the surge in cybersecurity incidents. Governments and enterprises have to constantly review, upgrade and change their security policies and systems to protect their high-value data, sensitive information, revenue, intellectual property and reputation. As a leading player in cybersecurity and information…

  • Gearing Up For Cybersecurity Resilience

    Gearing Up For Cybersecurity Resilience

    Relying on IT departments to manage a cybersecurity incident is a thing of the past. Senior leaders of a large national Banking, financial services and insurance (BFSI) organisation took steps to proactively develop a Cybersecurity Incident Response Plan (CIRP), involving multiple IT and non-IT departments and incorporating the CIRP as part of the broader Business…

  • Empowering Cyber Readiness

    Empowering Cyber Readiness

    With the aim of building a digitally inclusive society, developing secure and reliable digital infrastructure is of priority to the Information and Communication Technology Agency (ICTA) of Sri Lanka. Call for a National Security Operation Centre (NSOC) In 2016, ICTA of Sri Lanka, together with Sri Lanka CERT|CC, embarked on a significant and important initiative to…