Ebook

Ensign's Cybersecurity Guide on Cybersecurity Code of Practice (CCoP 2.0) for Critical Information Infrastructure (CII)

Learn more about the key changes in the revised Cybersecurity Code of Practice, and how Ensign can help Critical Information Infrastructure Owners manage cyber risks, and become compliant with the new code

Ebook

Securing The Payments Industry For Enhanced Consumer Confidence

The Payment Card Industry Data Security Standard (PCI DSS) was developed to encourage and enhance payment card account data security, as well as facilitate the broad adoption of consistent data security measures globally. Find out more on how PCI DSS develops a baseline of technical and operational requirements designed to protect account data.

Featured Editorial

Bracing For the Rising Tide of Cyber Threats Against the Maritime Industry

Maritime organisations face increasing cyber threats as they leverage on technology in their operations and management processes. Ensign’s Head of Advisory, Teo Xiang Zheng explains how maritime organisations can shore up their cyber defences in this opinion piece on Seatrade Maritime.

Factsheet

Ensign IR Case Study - Investigation into BlackCocaine Ransomware

This case study looks into a BlackCocaine ransomware attack that hit a banking and financial software company. Gain insights into how Ensign’s Hunt and Incident Response Operations (HIRO) team deployed containment measures to mitigate the impact of the breach.

Featured Editorial

Four Key Cyber Strategies To Isolate Supply Chain Cyber Risks

Vulnerabilities in Log4J, SolarWinds, and Kaseya serve as a reminder for organisations to double down on defences of the supply chains. In this CybersecAsia feature, our Head of Advisory from Hong Kong, Marco Sin, spells out four key cyber strategies your organisation can take to isolate supply chain cyber risks.

Featured Editorial

The Importance of AI in the Fight Against Ransomware

Ransomware attacks are on the rise globally. Ensign’s Lead Data Scientist, Lee Joon Sern, explains the importance of Artificial Intelligence in combating these threats. He touches on how AI-Powered cyber defences work at the different stages of a ransomware’s cyber kill chain.

Ebook

Partnering with the right Managed Security Services Provider

Get a better understanding of some key points before deciding to outsource your security monitoring to a Managed Security Services Provider.

Threat Advisory

The Cyber Impact of Russia-Ukraine Conflict: Heightened Global Cyber Threat Activity

As the Russia-Ukraine conflict continues to escalate, the resulting geopolitical instability has exposed organisations both within and beyond the region to increased cyber threat activity. Learn more about notable cyber threat incidents, and some recommendations to facilitate proactive actions in response to the conflict-related threats.

Featured Editorial

Stepping Up to Halt Cyber Supply Chain Attacks

Ensign Consulting’s Head of Advisory, Teo Xiang Zheng tells itnews why organisations need to step up and extend their cybersecurity practices across their cyber ecosystems.

Threat Advisory

Ensign Threat Advisory: Executive Brief on the Cyber Impact of Russia-Ukraine Conflict

This Executive Brief summarises the observed attacks’ effects and their implications. We have provided recommendations that organisations and businesses can consider to prevent being part of the collateral damage from the conflict.

Threat Advisory

Ensign Threat Advisory: Cyber Implications of the Ukraine Crisis

Ensign’s recommendations on the proactive actions organisations can take to reduce the likelihood and impact of a potentially damaging cyber attack.

Interview

Cybernews Interview (feat. Chan Kok Leong)

From key threats to watch out for to Ensign doubling down on its R&D efforts, Chan Kok Leong, Ensign’s VP of Engineering shares it all in an interview with CyberNews. He also talks about Ensign’s cybersecurity journey, and how the company aims to forge ahead.

Threat Landscape Report

Ensign Cyber Threat Landscape Report 2022

Ensign Cyber Threat Landscape Report 2022 showcases an expansion of coverage to include insights into global, regional, and territory-specific threats in 2021, more specifically in Singapore, Hong Kong S.A.R., Malaysia, and South Korea. It also discusses recommendations on how organisations can prepare for any eventuality arising from such threats.

Threat Insights

Ensign-IDC Infobrief

The Ensign-IDC Infobrief looks into the CISO’s (Chief Information Security Officers) agenda. Gain insights into how CISOs are able to better address cyber risks, and understand the importance of an intelligence-led approach to fend off the cyberthreat onslaught.

Factsheet

Ensign Managed Security Services: Managed Detection & Response

Learn how Ensign's Managed Detection & Response solution can help your organisation effectively detect and respond to cyber threats.

Featured Editorial

Growing Cyber Threats Against Cyber-Physical Systems

Ng Yeok Chong, Ensign InfoSecurity's Head of Infrastructure Security highlights the importance of protecting cyber-physical systems against cyber attacks.

Threat Advisory

Accellion FTA Breach

Ensign's plans and procedures in response to the recent breach involving Accellion.

Threat Advisory

BendyBear

Ensign's plans and procedures in response to BendyBear.

Threat Advisory

Ensign Threat Advisory: DarkSide Ransomware

Ensign's plans and procedures in response to Darkside Ransomware.

Threat Advisory

Microsoft Exchange Server Vulnerabilities

Ensign's plans and procedures in response to the Microsoft exchange server vulnerabilities which compromised over 20,000 organisations.

Ebook

Cybersecurity Guide on the Revised MAS-TRM Guidelines 2021: Securing the Future of Financial Institutions and FinTech

Download the eBook to find out more about the 12 key changes of the revised MAS-TRM Guidelines, along with Ensign’s recommended approach.

Featured Editorial

Data: A Key Weapon in Your Cybersecurity Arsenal

In a Frontier Enterprise article, Ensign’s Data Science Vice-President, Quek Han Yang, elaborates on the role that data plays in building a proactive cybersecurity posture.

Threat Advisory

SolarWinds Breach: What you need to know and do

Ensign's plans and procedures in response to the recent breach involving SolarWinds.

Combatting Intelligence with Intelligence: Why AI and ML are key in a strong cyber defence

Ensign InfoSecurity’s Lead Data Scientist, Lee Joon Sern weighs in on the current threat landscape and the importance of empowering cyber systems with artificial intelligence and machine learning.

Featured Editorial

Getting Serious About Protecting Personal Data

Ensign InfoSecurity’s Head of Advisory, Teo Xiang Zheng shares with BizQ what the recent changes to the Personal Data Protection Act could mean for businesses.

Factsheet

Ensign Digital Forensic and Incident Response

Learn how Ensign leverages on cyber threat intelligence and automation to improve its speed in incident response. Ensign’s Digital Forensic and Incident Response factsheet gives you an overview of how best you can apply threat hunting and incident response for OT/ICS and Cloud environments.

Factsheet

Combat Ransomware

Ensign's Anti-Ransomware Suite equips organisations with capabilities to prevent, detect, and respond to advanced ransomware threats.

Factsheet

Ensign Data Loss Prevention Programme

Ensign’s DLP Programme helps secure data in-use, data in-motion, and data at-rest across endpoints, networks, storage and the Cloud.

Threat Advisory

Understanding The Impact of Apache Log4j Vulnerability

Gain a better understanding of how and why organisations are doubling down on immediate actions surrounding the Log4J vulnerability.

Threat Advisory

Widely Used Logging Library Vulnerability “Log4Shell” Actively Exploited in the Wild

Ensign's plans and procedures in response to the Apache Java Logging Library Log4j 2 Critical RCE Vulnerability.

Featured Editorial

TypoSwype: An Imaging Approach to Detect Typo-squatting

Ensign Labs’ research highlights how TypoSwype can detect Typo-Squatting.

Threat Advisory

Ensign Threat Advisory: Dell Hardware / Firmware Vulnerabilities

Hardware / Firmware Vulnerabilities discovered in over 100 Dell models.

Threat Advisory

REvil Supply Chain Ransomware Attack Against Kaseya VSA and Multiple Managed Service Providers

Factsheet

Ensign Smishing Protection

Learn more about Ensign Smishing Protection, and how we can protect you against smishing attacks.

Threat Advisory

Ensign Threat Advisory: SolarWinds Attackers NOBELIUM’s Next Wave

Ensign’s plans and procedures in response to the NOBELIUM threat actor group’s cyber attack campaigns.

Ebook

Cybersecurity Guide: HKMA Cybersecurity Fortification Initiative 2.0

This eBook expands on the key changes to HKMA’s CFI 2.0, and the C-RAF, as well as highlights how Ensign can help FIs benefit from them.

Threat Landscape Report

Ensign Cyber Threat Landscape Report 2021

Gain insights into the attackers’ tactics, techniques, and procedures, as well as detailed accounts of their impact on Asia-Pacific organisations in 2020.

Ebook

Cybersecurity Guide on the Personal Data Protection (Amendment) Bill

Download our ebook to find out the key changes of the amendment bill and their impact on Singapore organisations.

Interview

CH5 & CNA Broadcast Interview

Ensign's Senior Vice President of Technology and Capabilities, Lee Shih Yen, spoke about the rise of cyberattacks in the healthcare industry in an interview with CNA.

Featured Editorial

Ensign subsidiary D’Crypt develops contact tracing technologies

D’Crypt has developed contact tracing technologies to help organisations monitor and minimise the spread of Covid-19.

Interview

CybersecAsia Interview

In a CybersecAsia interview, Lim Minhan, Director for Assurance in Ensign Consulting shares why Purple Teaming is an effective threat adversarial approach in today’s evolving environment.

Interview

Cybersecurity – A Collective Responsibility and Business Enabler for Enterprises

In a Business Times article, Roland Lau, Vice President, Managed Security Service, Ensign Infosecurity shares why cybersecurity is a collective responsibility and business enabler for enterprises.

Ebook

BFSI Disruptive Technology Adoption and Threats

Download our eBook to find out how the BFSI industry is adopting disruptive technology, and the cyber risks arising from it.

Webinar

PDPA 2.0. Manage. Respond. Report.

Learn about the legal implications of the PDPA Amendment Bill, key policy changes and the impact to organisational procedures, as well as how to manage and respond effectively to data breach incidents.

Webinar

Ensign's Data Loss Prevention Programme

Ensign’s DLP Programme helps secure data in-use, data in-motion, and data at-rest across endpoints, networks, storage and the Cloud.

Factsheet

Red Teaming

Learn more about Ensign’s Red Teaming Services

Factsheet

​Advanced Analytics

Cyber threats are becoming more advanced and sophisticated, and have the ability to bypass traditional detection tools. Ensign Advanced Analytics provides capabilities of advanced threat detection using artificial intelligence and machine learning behavioural models.

Webinar

Securing Today's OT Environments

Gain insights into the risks resulting from the expansion of OT ecosystems’ attack surfaces, and the best practices for mitigating them.

Featured Editorial

Guide for the Healthcare Sector During the Pandemic – June 2020

“Relentless” cyberattacks are expected to persist. New and hastily built healthcare infrastructure are particularly at risk, according to cybersecurity firm, Ensign InfoSecurity.

Threat Insights

Cybersecurity for Organisations in 2020: Threats, Trends & Mitigation

Learn about the threats and trends observed by Ensign InfoSecurity in 2020, as well as suggestions on how to mitigate them.

Factsheet

Access & Identity

Critical data such as customer identities, financial information, and personally identifiable information are prime targets for cyber threat actors. Find out how Ensign can help you protect your crown jewels.

Threat Advisory

Threat Advisories July 2020: Spike in Ursnif Trojan Activity Targeting BFSI Companies

Ensign Labs’ proprietary Automated Malware Analysis Platform has detected a spike in malware activities targeting BFSI companies.

Threat Advisory

Threat Advisory Report: Suspicious DNS Queries May 2020

Ensign Labs' DNS anomaly behavioural model detects suspicious DNS queries.

Interview

Interview Feature on MoneyFM 89.3

Our resident expert, Low Chee Juee, shared key findings of the Ensign Threat Landscape Report 2020 in an interview with MONEYFM 89.3.

Infographic

Top Threat Attack Vectors and Targeted Industries

Find out the top threat attack vectors enterprises faced in 2019.

Interview Feature in Thomson Reuters Regulatory Intelligence Report

Threat Landscape Report

Cyber Threat Landscape Report 2020

Gain detailed insights into the most prevalent threats observed in Singapore’s cyber landscape in 2019.

Ensign InfoSecurity
  • Follow us
  • Ensign Linkedin
Copyright © 2023 Ensign InfoSecurity Pte. Ltd.