Featured Content
Featured Editorial

Reverse Engineering in Malware Analysis
Ensign InfoSecurity’s Malware Analysis team dissects malware to provide a deeper understanding into the adverse impact malware can make. This way, incident responders get an insight into the different malware types’ behaviours and capabilities, enabling them to better deter potentially advanced threats. Gain insights into how our team applies reverse engineering in our malware analysis approach. The article will take you through the reasons why organisations should employ malware analysis, and the methodologies that are instrumental in preventing potential damages.
Threat Advisory

The Cyber Impact of Russia-Ukraine Conflict: Heightened Global Cyber Threat Activity
As the Russia-Ukraine conflict continues to escalate, the resulting geopolitical instability has exposed organisations both within and beyond the region to increased cyber threat activity. Learn more about notable cyber threat incidents, and some recommendations to facilitate proactive actions in response to the conflict-related threats.
Threat Advisory

Ensign Threat Advisory: Executive Brief on the Cyber Impact of Russia-Ukraine Conflict
This Executive Brief summarises the observed attacks’ effects and their implications. We have provided recommendations that organisations and businesses can consider to prevent being part of the collateral damage from the conflict.
Ensign Content

Cybernews Interview (feat. Chan Kok Leong)
From key threats to watch out for to Ensign doubling down on its R&D efforts, Chan Kok Leong, Ensign’s VP of Engineering shares it all in an interview with CyberNews. He also talks about Ensign’s cybersecurity journey, and how the company aims to forge ahead.
Threat Advisory

Ensign Threat Advisory: Cyber Implications of the Ukraine Crisis
Ensign’s recommendations on the proactive actions organisations can take to reduce the likelihood and impact of a potentially damaging cyber attack.
Infobrief

Ensign-IDC Infobrief
The Ensign-IDC Infobrief looks into the CISO’s (Chief Information Security Officers) agenda. Gain insights into how CISOs are able to better address cyber risks, and understand the importance of an intelligence-led approach to fend off the cyberthreat onslaught.