Ensign's Cybersecurity Guide on Cybersecurity Code of Practice (CCoP 2.0) for Critical Information Infrastructure (CII)
Learn more about the key changes in the revised Cybersecurity Code of Practice, and how Ensign can help Critical Information Infrastructure Owners manage cyber risks, and become compliant with the new code
Ebook
Securing The Payments Industry For Enhanced Consumer Confidence
The Payment Card Industry Data Security Standard (PCI DSS) was developed to
encourage and enhance payment card account data security, as well as facilitate the broad adoption of consistent data security measures globally.
Find out more on how PCI DSS develops a baseline of technical and operational requirements
designed to protect account data.
Featured Editorial
Bracing For the Rising Tide of Cyber Threats Against the Maritime Industry
Maritime organisations face increasing cyber threats as they leverage on technology in their operations and management processes. Ensign’s Head of Advisory,
Teo Xiang Zheng explains how maritime organisations can shore up their cyber defences in this opinion piece on Seatrade Maritime.
Factsheet
Ensign IR Case Study - Investigation into BlackCocaine Ransomware
This case study looks into a BlackCocaine ransomware attack that hit a banking and financial software company. Gain insights into how Ensign’s Hunt and Incident Response Operations (HIRO) team deployed containment measures to mitigate the impact of the breach.
Featured Editorial
Four Key Cyber Strategies To Isolate Supply Chain Cyber Risks
Vulnerabilities in Log4J, SolarWinds, and Kaseya serve as a reminder for organisations to double down on defences of the supply chains. In this CybersecAsia feature, our Head of Advisory from Hong Kong, Marco Sin, spells out four key cyber strategies your organisation can take to isolate supply chain cyber risks.
Featured Editorial
The Importance of AI in the Fight Against Ransomware
Ransomware attacks are on the rise globally. Ensign’s Lead Data Scientist, Lee Joon Sern, explains the importance of Artificial Intelligence in combating these threats. He touches on how AI-Powered cyber defences work at the different stages of a ransomware’s cyber kill chain.
Ebook
Partnering with the right Managed Security Services Provider
Get a better understanding of some key points before deciding to outsource your security monitoring to a Managed Security Services Provider.
Threat Advisory
The Cyber Impact of Russia-Ukraine Conflict: Heightened Global Cyber Threat Activity
As the Russia-Ukraine conflict continues to escalate, the resulting geopolitical instability has exposed organisations both within and beyond the region to increased cyber threat activity. Learn more about notable cyber threat incidents, and some recommendations to facilitate proactive actions in response to the conflict-related threats.
Featured Editorial
Stepping Up to Halt Cyber Supply Chain Attacks
Ensign Consulting’s Head of Advisory, Teo Xiang Zheng tells itnews why organisations need to step up and extend their cybersecurity practices across their cyber ecosystems.
Threat Advisory
Ensign Threat Advisory: Executive Brief on the Cyber Impact of Russia-Ukraine Conflict
This Executive Brief summarises the observed attacks’ effects and their implications. We have provided recommendations that organisations and businesses can consider to prevent being part of the collateral damage from the conflict.
Threat Advisory
Ensign Threat Advisory: Cyber Implications of the Ukraine Crisis
Ensign’s recommendations on the proactive actions organisations can take to reduce the likelihood and impact of a potentially damaging cyber attack.
Interview
Cybernews Interview (feat. Chan Kok Leong)
From key threats to watch out for to Ensign doubling down on its R&D efforts, Chan Kok Leong, Ensign’s VP of Engineering shares it all in an interview with CyberNews. He also talks about Ensign’s cybersecurity journey, and how the company aims to forge ahead.
Threat Landscape Report
Ensign Cyber Threat Landscape Report 2022
Ensign Cyber Threat Landscape Report 2022 showcases an expansion of coverage to include insights into global, regional, and territory-specific threats in 2021, more specifically in Singapore, Hong Kong S.A.R., Malaysia, and South Korea. It also discusses recommendations on how organisations can prepare for any eventuality arising from such threats.
Threat Insights
Ensign-IDC Infobrief
The Ensign-IDC Infobrief looks into the CISO’s (Chief Information Security Officers) agenda. Gain insights into how CISOs are able to better address cyber risks, and understand the importance of an intelligence-led approach to fend off the cyberthreat onslaught.
Learn how Ensign's Managed Detection & Response solution can help your organisation effectively detect and respond to cyber threats.
Featured Editorial
Growing Cyber Threats Against Cyber-Physical Systems
Ng Yeok Chong, Ensign InfoSecurity's Head of Infrastructure Security highlights the importance of protecting cyber-physical systems against cyber attacks.
Threat Advisory
Accellion FTA Breach
Ensign's plans and procedures in response to the recent breach involving Accellion.
Threat Advisory
BendyBear
Ensign's plans and procedures in response to BendyBear.
Threat Advisory
Ensign Threat Advisory: DarkSide Ransomware
Ensign's plans and procedures in response to Darkside Ransomware.
Threat Advisory
Microsoft Exchange Server Vulnerabilities
Ensign's plans and procedures in response to the Microsoft exchange server vulnerabilities which compromised over 20,000 organisations.
Ebook
Cybersecurity Guide on the Revised MAS-TRM Guidelines 2021: Securing the Future of Financial Institutions and FinTech
Download the eBook to find out more about the 12 key changes of the revised MAS-TRM Guidelines, along with Ensign’s recommended approach.
Featured Editorial
Data: A Key Weapon in Your Cybersecurity Arsenal
In a Frontier Enterprise article, Ensign’s Data Science Vice-President, Quek Han Yang, elaborates on the role that data plays in building a proactive cybersecurity posture.
Threat Advisory
SolarWinds Breach: What you need to know and do
Ensign's plans and procedures in response to the recent breach involving SolarWinds.
Combatting Intelligence with Intelligence: Why AI and ML are key in a strong cyber defence
Ensign InfoSecurity’s Lead Data Scientist, Lee Joon Sern weighs in on the current threat landscape and the importance of empowering cyber systems with artificial intelligence and machine learning.
Featured Editorial
Getting Serious About Protecting Personal Data
Ensign InfoSecurity’s Head of Advisory, Teo Xiang Zheng shares with BizQ what the recent changes to the Personal Data Protection Act could mean for businesses.
Factsheet
Ensign Digital Forensic and Incident Response
Learn how Ensign leverages on cyber threat intelligence and automation to improve its speed in incident response. Ensign’s Digital Forensic and Incident Response factsheet gives you an overview of how best you can apply threat hunting and incident response for OT/ICS and Cloud environments.
Factsheet
Combat Ransomware
Ensign's Anti-Ransomware Suite equips organisations with capabilities to prevent, detect, and respond to advanced ransomware threats.
Factsheet
Ensign Data Loss Prevention Programme
Ensign’s DLP Programme helps secure data in-use, data in-motion, and data at-rest across endpoints, networks, storage and the Cloud.
Threat Advisory
Understanding The Impact of Apache Log4j Vulnerability
Gain a better understanding of how and why organisations are doubling down on immediate actions surrounding the Log4J vulnerability.
Threat Advisory
Widely Used Logging Library Vulnerability “Log4Shell” Actively Exploited in the Wild
Ensign's plans and procedures in response to the Apache Java Logging Library Log4j 2 Critical RCE Vulnerability.
Featured Editorial
TypoSwype: An Imaging Approach to Detect Typo-squatting
Ensign Labs’ research highlights how TypoSwype can detect Typo-Squatting.
This eBook expands on the key changes to HKMA’s CFI 2.0, and the C-RAF, as well as highlights how Ensign can help FIs benefit from them.
Threat Landscape Report
Ensign Cyber Threat Landscape Report 2021
Gain insights into the attackers’ tactics, techniques, and procedures, as well as detailed accounts of their impact on Asia-Pacific organisations in 2020.
Ebook
Cybersecurity Guide on the Personal Data Protection (Amendment) Bill
Download our ebook to find out the key changes of the amendment bill and their impact on Singapore organisations.
Interview
CH5 & CNA Broadcast Interview
Ensign's Senior Vice President of Technology and Capabilities, Lee Shih Yen, spoke about the rise of cyberattacks in the healthcare industry in an interview with CNA.
D’Crypt has developed contact tracing technologies to help organisations monitor and minimise the spread of Covid-19.
Interview
CybersecAsia Interview
In a CybersecAsia interview, Lim Minhan, Director for Assurance in Ensign Consulting shares why Purple Teaming is an effective threat adversarial approach in today’s evolving environment.
Interview
Cybersecurity – A Collective Responsibility and Business Enabler for Enterprises
In a Business Times article, Roland Lau, Vice President, Managed Security Service, Ensign Infosecurity shares why cybersecurity is a collective responsibility and business enabler for enterprises.
Ebook
BFSI Disruptive Technology Adoption and Threats
Download our eBook to find out how the BFSI industry is adopting disruptive technology, and the cyber risks arising from it.
Webinar
PDPA 2.0. Manage. Respond. Report.
Learn about the legal implications of the PDPA Amendment Bill, key policy changes and the impact to organisational procedures, as well as how to manage and respond effectively to data breach incidents.
Webinar
Ensign's Data Loss Prevention Programme
Ensign’s DLP Programme helps secure data in-use, data in-motion, and data at-rest across endpoints, networks, storage and the Cloud.
Factsheet
Red Teaming
Learn more about
Ensign’s Red Teaming Services
Factsheet
Advanced Analytics
Cyber threats are becoming more advanced and sophisticated, and have the ability to bypass traditional detection tools. Ensign Advanced Analytics provides capabilities of advanced threat detection using artificial intelligence and machine learning behavioural models.
Webinar
Securing Today's OT Environments
Gain insights into the risks resulting from the expansion of OT ecosystems’ attack surfaces, and the best practices for mitigating them.
Featured Editorial
Guide for the Healthcare Sector During the Pandemic – June 2020
“Relentless” cyberattacks are expected to persist. New and hastily built healthcare
infrastructure are particularly at risk, according to cybersecurity
firm, Ensign InfoSecurity.
Threat Insights
Cybersecurity for Organisations in 2020: Threats, Trends & Mitigation
Learn about the threats and trends observed by Ensign InfoSecurity in 2020, as well as suggestions on how to mitigate them.
Factsheet
Access & Identity
Critical data such as customer identities, financial information, and personally identifiable information are prime targets for cyber threat actors. Find out how Ensign can help you protect your crown jewels.
Threat Advisory
Threat Advisories July 2020: Spike in Ursnif Trojan Activity Targeting BFSI Companies
Ensign Labs’ proprietary Automated Malware Analysis Platform has detected a spike in malware activities targeting BFSI companies.
Threat Advisory
Threat Advisory Report: Suspicious DNS Queries May 2020
Ensign Labs' DNS anomaly behavioural model detects suspicious DNS queries.
Interview
Interview Feature on MoneyFM 89.3
Our resident expert, Low Chee Juee, shared key findings of the Ensign Threat Landscape Report 2020 in an interview with MONEYFM 89.3.
Infographic
Top Threat Attack Vectors and Targeted Industries
Find out the top threat attack vectors enterprises faced in 2019.
Interview Feature in Thomson Reuters Regulatory Intelligence Report
Threat Landscape Report
Cyber Threat Landscape Report 2020
Gain detailed insights into the most prevalent threats observed in Singapore’s cyber landscape in 2019.