Skip to main content
  • Cybersecurity Threat Modelling and Zone-based Modelling

    Put the Cart before the Horse

    Quite often it is tempting for security professionals rushing out to buy firewalls, intrusion protection systems even before knowing what the cybersecurity threats and online attacks they are facing.

    Threat Modelling

  • targeted attacker
    Targeted Attackers
    Recent incidents of cyber attacks on financial institutions, JP Morgan and others, appear to be under targeted cyber-attacks. That is, the attackers are quiet, prepared and they are invisible at least for now. And it isn’t as if Chase hasn’t invested in threat protection. This year alone, it plans to spend more than $250 million on cybersecurity, according to a letter to investors from April.
  • password
    1 Billion Passwords Stolen
    A Russian crime ring has accumulated over 1 billion Internet credentials, The New York Times is reporting [1]. The hacking ring, apparently based in a small city in south-central Russia, is said to have 1.2 billion stolen usernames and passwords, including access to 500 million email addresses.
  • News Thumbnail
    Security for Mobile Devices

    Mr Freeman Ng, our Principal Consultant was interviewed by Roadshow on 24 July 2014 featured “Security for Mobile Device”.

  • backdoor
    Close the Backdoors Please
    A backdoor can be inserted by vendor for remote support or by cyber actor for unauthorized system access. Backdoors present significant risks to enterprises because potentially anyone who knows or finds out about one could abuse it and not be easily detected.