Vulnerabilities in Log4J, SolarWinds, and Kaseya serve as a reminder for organisations to double down on defences of the supply chains. In this CybersecAsia feature, our Head of Advisory from Hong Kong, Marco Sin, spells out four key cyber strategies your organisation can take to isolate supply chain cyber risks.
Get a better understanding of some key points before deciding to outsource your security monitoring to a Managed Security Services Provider.
Ensign InfoSecurity’s Malware Analysis team dissects malware to provide a deeper understanding into the adverse impact malware can make. This way, incident responders get an insight into the different malware types’ behaviours and capabilities, enabling them to better deter potentially advanced threats. Gain insights into how our team applies reverse engineering in our malware analysis approach. The article will take you through the reasons why organisations should employ malware analysis, and the methodologies that are instrumental in preventing potential damages.
As the Russia-Ukraine conflict continues to escalate, the resulting geopolitical instability has exposed organisations both within and beyond the region to increased cyber threat activity. Learn more about notable cyber threat incidents, and some recommendations to facilitate proactive actions in response to the conflict-related threats.
This Executive Brief summarises the observed attacks’ effects and their implications. We have provided recommendations that organisations and businesses can consider to prevent being part of the collateral damage from the conflict.
From key threats to watch out for to Ensign doubling down on its R&D efforts, Chan Kok Leong, Ensign’s VP of Engineering shares it all in an interview with CyberNews. He also talks about Ensign’s cybersecurity journey, and how the company aims to forge ahead.