There are no silver bullets to solve all problems; and it's even more costly to handle the aftermath of a breach, says F-Secure's Keith Martin.
Malaysia’s international cybersecurity hub initiative - AsiaCyberX - is supported by the Malaysia Digital Economy Corporation (MDEC). MDEC is also partnering with LGMS to roll out a 12-month MDEC Cybersecurity Development Programme.
Predictions for the wide area network (WAN) in 2018.
Keith Martin, F-Secure’s new Asia-Pacific and Japan Head of Corporate Business, and Amit Nath speak to Computerworld Malaysia about the current threat landscape.
What does 2018 have in store for cyber security, and could it possibly be worse than this year?
Smart City Security: CyberSecurity Malaysia launches 'first if its kind' IoT penetration testing system
CyberSecurity Malaysia CEO Dato’ Dr Amirudin Abdul Wahab told Computerworld Malaysia that ‘VAPT also extends to assessing SCADA/ Industrial Control System security.’
The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.
Only a quarter feel businesses take customer data security very seriously
macOS High Sierra ‘root’ security bug reappears if you recently upgraded from macOS 10.13 to 10.13.1
You may need to reinstall the security update.
With Google, Facebook, Instagram, or your own internal accounts, 2FA provides an extra layer of protection that helps keep hackers out.
Organizations handle vulnerability management in various ways, from training and best-practice implementations to filtering out all but the most dangerous threats. Here's a look at some of today's more innovative solutions.
The global security threat outlook evolves with every coming year. To combat the threat in 2018, enterprises must understand these five global cyber threats.
Penetration testing, or ethical hacking, is an in-demand skill for testing an organization’s defenses. Here’s what it entails and tips for breaking into the role.
Economics don't allow all internet of things devices to have baked-in security, so it has to be addressed elsewhere.
We go hands-on with some of the most innovative, useful and, arguably, best security tools from today's most important cybersecurity technology categories.
The influx of fake news has taken a social toll, but it is also an attack vector for phishing and malware delivery.
The impact of system outages brings to light the stark reality that as cloud continues to evolve, there are serious challenges to its true resiliency to withstand unforced errors
Here are 5 keys to spotting phishing scams from network and security strategist Gavin Chow.