cybersecurity

How your laptop can help boost your enterprise security posture
0

How your laptop can help boost your enterprise security posture

January 19th, 2022 | by Techgoondu
Enterprises need to find a way to better secure endpoint devices like laptops, as part of a holistic defence against new cyber...
As issues of fairness and sustainability boil over, a developer sabotages his open-source code in protest
2

As issues of fairness and sustainability boil over, a developer sabotages his open-source code in protest

January 10th, 2022 | by Alfred Siew
The most important software that underpins so much of today's digital infrastructure is maintained by volunteers who are often...
Latest Log4j vulnerability a reminder of far reaching impact of software dependencies
0

Latest Log4j vulnerability a reminder of far reaching impact of software dependencies

December 16th, 2021 | by Alfred Siew
In an interconnected digital world, where software runs everything, a flaw in a foundational piece of code leads to widespread...
Why it’s time for an AMD Ryzen PRO inside your next business laptop
0

Why it’s time for an AMD Ryzen PRO inside your next business laptop

September 29th, 2021 | by Techgoondu
AMD Ryzen™ PRO 5000 Series Mobile Processors now come with a range of features that elevate productivity through class-leading...
Half of Singapore SMBs hit by cyberattacks lost US$500,000 or more: Cisco
0

Half of Singapore SMBs hit by cyberattacks lost US$500,000 or more: Cisco

September 28th, 2021 | by Alfred Siew
Forty per cent of SMBs in Singapore were hit by a cyberattack in the past year, with many losing customer data and suffering...
MyRepublic data breach, the latest to hit a Singapore Internet service provider, should raise alarms
0

MyRepublic data breach, the latest to hit a Singapore Internet service provider, should raise alarms

September 11th, 2021 | by Alfred Siew
These MyRepublic data breach and other recent ones are worrying enough for regulators to mandate stronger protections for personal...
Twist in Poly Network heist, as hacker who stole digital coins says it was done for good
0

Twist in Poly Network heist, as hacker who stole digital coins says it was done for good

August 12th, 2021 | by Grace Chng
The hacker is believed to have overwritten the instructions on smart contracts set up for three blockchains connected on Poly...
What caused the data leak at StarHub, the latest telco to get hit?
0

What caused the data leak at StarHub, the latest telco to get hit?

August 10th, 2021 | by Alfred Siew
As the StarHub data leak shows, efforts to mitigate a damaging incident must be timely, transparent and useful to victims affected by...
Yet another supply chain cyberattack, now on Kaseya, should worry businesses
0

Yet another supply chain cyberattack, now on Kaseya, should worry businesses

July 5th, 2021 | by Alfred Siew
As yet another supply chain breach at Kaseya shows, the risk of getting attacked is increasing in a software-controlled, interconnected...
Cybersecurity needs updating with hybrid workstyles but talent is hard to find
0

Cybersecurity needs updating with hybrid workstyles but talent is hard to find

June 17th, 2021 | by Alfred Siew
After they moved to the cloud in an unplanned or accelerated fashion, many businesses now have to find cybersecurity talent. It's not...
Businesses use the cloud to manage risk but are they also concentrating it?
0

Businesses use the cloud to manage risk but are they also concentrating it?

June 3rd, 2021 | by Alfred Siew
As businesses rely more on public cloud providers to run their operations, they may also be concentrating their...
As ransomware evolves, businesses need new tools to fight back
0

As ransomware evolves, businesses need new tools to fight back

April 21st, 2021 | by Techgoondu
Businesses need the right tools and expertise to proactively hunt for threats posed by increasingly sophisticated cyber...
In Singtel hacking case, lessons to be learnt on managing fallout
0

In Singtel hacking case, lessons to be learnt on managing fallout

February 18th, 2021 | by Alfred Siew
It is impossible to stop all cyberattacks, so how a business responds to the fallout is critical, as the Singtel hacking case...
Log in to e-services by scanning your face, sending SMS to children for SingPass verification
0

Log in to e-services by scanning your face, sending SMS to children for SingPass verification

December 17th, 2020 | by Alfred Siew
By scanning their faces to verify their identity, SingPass users can sign on to Singapore government services...
Q&A: Collective defence will better combat cyber threats in polarised world, says IronNet
0

Q&A: Collective defence will better combat cyber threats in polarised world, says IronNet

December 16th, 2020 | by Alfred Siew
Despite technologies such as 5G and cloud being highly politicised today, there is still room for collaboration, says...
Cybersecurity should be built into your network
0

Cybersecurity should be built into your network

November 24th, 2020 | by Techgoondu
Fundamental changes have forced IT leaders to look to defence in depth, and have cyber security baked into their infrastructure and...
RedMart data breach a reminder of danger of forgotten pieces of data
0

RedMart data breach a reminder of danger of forgotten pieces of data

October 31st, 2020 | by Alfred Siew
The RedMart data breach has revealed one common vulnerability facing many businesses today - forgotten pieces of data from the...
Successful digital enterprises must transform the WAN or security – or both
0

Successful digital enterprises must transform the WAN or security – or both

October 29th, 2020 | by Techgoondu
Combining an SD-WAN with cybersecurity helps maximise returns on investments on the cloud, says Silver...
DIY: Secure your home cameras by reducing exposure
0

DIY: Secure your home cameras by reducing exposure

October 14th, 2020 | by Alfred Siew
You can't keep out all threats but you can reduce the risk of your home cameras being hijacked by hackers by minimising your...
Cybersecurity hygiene key to keeping cyber threats at bay, say experts
0

Cybersecurity hygiene key to keeping cyber threats at bay, say experts

September 22nd, 2020 | by Grace Chng
Cybersecurity hygiene is key to keeping out malware as organisations attempt to ward off cyber intruders during the pandemic....