Resources

Resources2023-01-06T14:36:56+08:00
703, 2023

Sales Ethics in Cybersecurity: Trust and Integrity as the Guiding Principles in What We Do

March 7th, 2023|Categories: Articles|Tags: , , , , |

With the importance and size of the cybersecurity industry growing every day, it is a race for companies to grab market shares in order to achieve revenue goal as well as reaching the ever-glorious “market leader” status, more so in an event of a potential economic slowdown to secure the opportunities available. Unfortunately, some companies have taken advantage of this situation by using deceptive sales tactics. While these tactics may be effective in the short-term, they are not ethical and can lead to reputational damage.

1302, 2023

Breach and Attack Simulation (BAS) and Vulnerability Assessment and Penetration Testing (VAPT). Which one do I need?

February 13th, 2023|Categories: Articles|

BAS and VAPT are two commonly used methods for testing the security of a computer system, network, or web application. Both approaches involve identifying and analysing vulnerabilities in the system in order to assess its defences against potential attacks, but there is some debate about which approach is more effective.

1001, 2023

An Approach to Effective Implementation of Data Leakage Prevention (DLP)

January 10th, 2023|Categories: Articles|Tags: , |

Losing important data can have serious consequences, including financial losses, legal issues, and damage to a company’s reputation. Therefore, it is essential to have proper governance and measures in place to mitigate the risks of data loss and ensure that valuable information is being safeguarded while being available to the authorised people.

2909, 2022

Optus Cyber Security Breach In September 2022

September 29th, 2022|Categories: Articles|

In September 2022, the Australian telecommunications company Optus suffered a major cyber security breach. The attack affected over two million customers and resulted in the loss of personal data, including names, addresses, dates of birth, genders, and contact details. The incident also exposed credit card numbers and other financial information.

Talk To Us

Penetration testing, cyber security strategy, proof-of-value, or just some information? Our domain experts provide bespoke cyber security offerings to solve your digital transformation challenges.

Go to Top