Resources

Resources2023-01-06T14:36:56+08:00
2905, 2023

The Challenges for Managed Security Service Providers (MSSP) in Malaysia

May 29th, 2023|Categories: Articles|Tags: , , |

Malaysia is a rapidly growing economy with a high rate of technology adoption. As more businesses digitize their operations, cybersecurity risks have also increased tremendously. Managed cybersecurity service providers (MSSPs) have emerged as a solution for businesses that lack the expertise or resources to manage their own cybersecurity. However, MSSPs in Malaysia face several challenges and shortcomings that can impact their ability to provide effective cybersecurity services to their clients.

2405, 2023

Planning Your XDR Journey

May 24th, 2023|Categories: Articles|Tags: , |

Extended Detection and Response (XDR) is the latest buzzword in the cybersecurity industry. The idea behind XDR is to provide organizations with a comprehensive view of their security landscape, by integrating data from multiple sources, and delivering faster and more accurate threat detection and response. XDR is a powerful technology that can significantly improve an organization's security posture, but it requires careful planning and execution.

1804, 2023

Supply Chains: The New Frontier for Cyber Attacks and How to Protect Your Business

April 18th, 2023|Categories: Articles|Tags: , , , |

The growing threat of cyber-attacks has made businesses of all sizes vulnerable in today's digital landscape. However, supply chains have emerged as a new frontier for cyber criminals. By taking proactive steps to protect businesses and their customers, organizations can better safeguard their supply chains and mitigate the impact of cyber-attacks.

703, 2023

Sales Ethics in Cybersecurity: Trust and Integrity as the Guiding Principles in What We Do

March 7th, 2023|Categories: Articles|Tags: , , , , |

With the importance and size of the cybersecurity industry growing every day, it is a race for companies to grab market shares in order to achieve revenue goal as well as reaching the ever-glorious “market leader” status, more so in an event of a potential economic slowdown to secure the opportunities available. Unfortunately, some companies have taken advantage of this situation by using deceptive sales tactics. While these tactics may be effective in the short-term, they are not ethical and can lead to reputational damage.

1302, 2023

Breach and Attack Simulation (BAS) and Vulnerability Assessment and Penetration Testing (VAPT). Which one do I need?

February 13th, 2023|Categories: Articles|

BAS and VAPT are two commonly used methods for testing the security of a computer system, network, or web application. Both approaches involve identifying and analysing vulnerabilities in the system in order to assess its defences against potential attacks, but there is some debate about which approach is more effective.

1001, 2023

An Approach to Effective Implementation of Data Leakage Prevention (DLP)

January 10th, 2023|Categories: Articles|Tags: , |

Losing important data can have serious consequences, including financial losses, legal issues, and damage to a company’s reputation. Therefore, it is essential to have proper governance and measures in place to mitigate the risks of data loss and ensure that valuable information is being safeguarded while being available to the authorised people.

Talk To Us

Penetration testing, cyber security strategy, proof-of-value, or just some information? Our domain experts provide bespoke cyber security offerings to solve your digital transformation challenges.

Go to Top