Featured Editorial

Featured Editorial
Reverse Engineering in Malware Analysis
Ensign InfoSecurity’s Malware Analysis team dissects malware to provide a deeper understanding into the adverse impact malware can make. This way, incident responders get an insight into the different malware types’ behaviours and capabilities, enabling them to better deter potentially advanced threats. Gain insights into how our team applies reverse engineering in our malware analysis approach. The article will take you through the reasons why organisations should employ malware analysis, and the methodologies that are instrumental in preventing potential damages.
Threat Advisory

Threat Advisory
The Cyber Impact of Russia-Ukraine Conflict: Heightened Global Cyber Threat Activity
As the Russia-Ukraine conflict continues to escalate, the resulting geopolitical instability has exposed organisations both within and beyond the region to increased cyber threat activity. Learn more about notable cyber threat incidents, and some recommendations to facilitate proactive actions in response to the conflict-related threats.
Threat Advisory

Threat Advisory
Ensign Threat Advisory: Executive Brief on the Cyber Impact of Russia-Ukraine Conflict
This Executive Brief summarises the observed attacks’ effects and their implications. We have provided recommendations that organisations and businesses can consider to prevent being part of the collateral damage from the conflict.
Ensign Content

Featured Editorial
Cybernews Interview (feat. Chan Kok Leong)
From key threats to watch out for to Ensign doubling down on its R&D efforts, Chan Kok Leong, Ensign’s VP of Engineering shares it all in an interview with CyberNews. He also talks about Ensign’s cybersecurity journey, and how the company aims to forge ahead.
Threat Advisory

Threat Advisory
Ensign Threat Advisory: Cyber Implications of the Ukraine Crisis
Ensign’s recommendations on the proactive actions organisations can take to reduce the likelihood and impact of a potentially damaging cyber attack.
Infobrief

Threat Insights
Ensign-IDC Infobrief
The Ensign-IDC Infobrief looks into the CISO’s (Chief Information Security Officers) agenda. Gain insights into how CISOs are able to better address cyber risks, and understand the importance of an intelligence-led approach to fend off the cyberthreat onslaught.
Commentary

Featured Editorial
Combatting Intelligence with Intelligence: Why AI (Artificial Intelligence) and ML (Machine Learning) are key in building a strong cyber defence
Ensign InfoSecurity’s Lead Data Scientist, Lee Joon Sern weighs in on the current threat landscape and the importance of empowering cyber systems with artificial intelligence and machine learning.
Factsheet

Factsheet
Combat Ransomware
Ensign's Anti-Ransomware Suite equips organisations with capabilities to prevent, detect, and respond to advanced ransomware threats.
Factsheet

Factsheet
Ensign Digital Forensic and Incident Response
Learn how Ensign leverages on cyber threat intelligence and automation to improve its speed in incident response. Ensign’s Digital Forensic and Incident Response factsheet gives you an overview of how best you can apply threat hunting and incident response for OT/ICS and Cloud environments.
Factsheet

Factsheet
Ensign Smishing Protection
Learn more about Ensign Smishing Protection, and how we can protect you against smishing attacks.
Webinar

Webinar
Ensign's Data Loss Prevention Programme
Ensign’s DLP Programme helps secure data in-use, data in-motion, and data at-rest across endpoints, networks, storage and the Cloud.
Threat Advisory

Threat Advisory
Understanding The Impact of Apache Log4j Vulnerability
Gain a better understanding of how and why organisations are doubling down on immediate actions surrounding the Log4J vulnerability.
Threat Advisory

Threat Advisory
Widely Used Logging Library Vulnerability “Log4Shell” Actively Exploited in the Wild
Ensign's plans and procedures in response to the Apache Java Logging Library Log4j 2 Critical RCE Vulnerability.
Threat Advisory

Threat Advisory
Ensign Threat Advisory: Dell Hardware / Firmware Vulnerabilities
Hardware / Firmware Vulnerabilities discovered in over 100 Dell models.
Threat Advisory

Threat Advisory
Ensign Threat Advisory: SolarWinds Attackers NOBELIUM’s Next Wave
Ensign’s plans and procedures in response to the NOBELIUM threat actor group’s cyber attack campaigns.
Threat Landscape Report

Ensign Cyber Threat Landscape Report 2021
Gain insights into the attackers’ tactics, techniques, and procedures, as well as detailed accounts of their impact on Asia-Pacific organisations in 2020.
Threat Advisory

Ensign Threat Advisory: DarkSide Ransomware
Ensign's plans and procedures in response to Darkside Ransomware.
Featured Editorial

Featured Editorial
TypoSwype: An Imaging Approach to Detect Typo-squatting
Ensign Labs’ research highlights how TypoSwype can detect Typo-Squatting.
Ensign Content

Data: A Key Weapon in Your Cybersecurity Arsenal
In a Frontier Enterprise article, Ensign’s Data Science Vice-President, Quek Han Yang, elaborates on the role that data plays in building a proactive cybersecurity posture.
Webinar

Webinar
Ensign's Data Loss Prevention Programme
Ensign’s DLP Programme helps secure data in-use, data in-motion, and data at-rest across endpoints, networks, storage and the Cloud.
eBook

Cybersecurity Guide on the Revised MAS-TRM Guidelines 2021: Securing the Future of Financial Institutions and FinTech
Download the eBook to find out more about the 12 key changes of the revised MAS-TRM Guidelines, along with Ensign’s recommended approach.
eBook

Ebook
Cybersecurity Guide: HKMA Cybersecurity Fortification Initiative 2.0
This ebook expands on the key changes to HKMA’s CFI 2.0, and the C-RAF, as well as highlights how Ensign can help FIs benefit from them.
Threat Advisory

Threat Advisory
Microsoft Exchange Server Vulnerabilities
Ensign's plans and procedures in response to the Microsoft exchange server vulnerabilities which compromised over 20,000 organisations.
Ensign Content

Featured Editorial
Getting Serious About Protecting Personal Data
Ensign InfoSecurity’s Head of Advisory, Teo Xiang Zheng shares with BizQ what the recent changes to the Personal Data Protection Act could mean for businesses.
Featured Editorial

Growing Cyber Threats Against Cyber-Physical Systems
Ng Yeok Chong, Ensign InfoSecurity's Head of Infrastructure Security highlights the importance of protecting cyber-physical systems against cyber attacks.
Threat Advisory

Threat Advisory
Accellion FTA Breach
Ensign's plans and procedures in response to the recent breach involving Accellion
Ensign Content

Featured Editorial
Stepping Up to Halt Cyber Supply Chain Attacks
Ensign Consulting’s Head of Advisory, Teo Xiang Zheng tells itnews why organisations need to step up and extend their cybersecurity practices across their cyber ecosystems.
Ensign Content

Featured Editorial
Cybersecurity – A Collective Responsibility and Business Enabler for Enterprises
In a Business Times article, Roland Lau, Vice President, Managed Security Service, Ensign Infosecurity shares why cybersecurity is a collective responsibility and business enabler for enterprises.
Webinar

Webinar
PDPA 2.0. Manage. Respond. Report.
Learn about the legal implications of the PDPA Amendment Bill, key policy changes and the impact to organisational procedures, as well as how to manage and respond effectively to data breach incidents.
eBook

Ebook
Cybersecurity Guide on the Personal Data Protection (Amendment) Bill
Download our ebook to find out the key changes of the amendment bill and their impact on Singapore organisations.
Ensign Content

Interview
CybersecAsia Interview
In a CybersecAsia interview, Lim Minhan, Director for Assurance in Ensign Consulting shares why Purple Teaming is an effective threat adversarial approach in today’s evolving environment.
Threat Advisory

Threat Advisory
SolarWinds Breach: What you need to know and do
Ensign's plans and procedures in response to the recent breach involving SolarWinds.
Featured Editorial

Featured Editorial
Data Security in a Post-Covid-19 World
Learn how organisations can overcome the cybersecurity challenges arising from contact tracing applications and data management.
Threat Insights

Threat Insights
Cybersecurity for Organisations in 2020: Threats, Trends & Mitigation
Learn about the threats and trends observed by Ensign InfoSecurity in 2020, as well as suggestions on how to mitigate them.
Threat Advisory

Threat Advisory
Threat Advisories July 2020: Spike in Ursnif Trojan Activity Targeting BFSI Companies
Ensign Labs’ proprietary Automated Malware Analysis Platform has detected a spike in malware activities targeting BFSI companies.
Factsheet

Factsheet
Ensign Managed Security Services: Managed Detection & Response
Learn how the Ensign Managed Detection & Response solution can help your organisation effectively detect and respond to cyber threats.
Ensign Content

Ensign subsidiary D’Crypt develops contact tracing technologies
D’Crypt has developed contact tracing technologies to help organisations monitor and minimise the spread of Covid-19.
eBook

Ebook
BFSI Disruptive Technology Adoption and Threats
Download our ebook to find out how the BFSI industry is adopting disruptive technology, and the cyber risks arising from it.
Ensign Content

Interview
CH5 & CNA Broadcast Interview
Ensign's Senior Vice President of Technology and Capabilities, Lee Shih Yen, spoke about the rise of cyberattacks in the healthcare industry in an interview with CNA.
Featured Editorial

Featured Editorial
Guide for the Healthcare Sector During the Pandemic June 2020
“Relentless” cyberattacks are expected to persist. New and hastily built healthcare
infrastructure are particularly at risk, according to cybersecurity
firm, Ensign InfoSecurity.
Webinar

Webinar
Securing Today's OT Environments
Gain insights into the risks resulting from the expansion of OT ecosystems’ attack surfaces, and the best practices for mitigating them.
Radio Interview Podcast

Interview
Interview Feature on MoneyFM 89.3
Our resident expert, Low Chee Juee, shared key findings of the Ensign Threat Landscape Report 2020 in an interview with MONEYFM 89.3.
Infographic

Infographic
Top Threat Attack Vectors and Targeted Industries
Find out the top threat attack vectors enterprises faced in 2019.
Threat Advisory

Threat Advisory
Threat Advisory Report: Suspicious DNS Queries May 2020
Ensign Labs' DNS anomaly behavioural model detects suspicious DNS queries.
Threat Landscape Report

Report
Cyber Threat Landscape Report 2020
Gain detailed insights into the most prevalent threats observed in Singapore’s cyber landscape in 2019.