Resources

Compromise Assessment: 5 Things your organisation should know

Compromise Assessment: 5 Things your organisation should know

"Are we breached?" This is the question that is answered by a Compromise Assessment (CA). However, unlike other assessment tools,…

2 years ago

Singapore cyber landscape 2021: What your organisation should know

In 2021, the cyber world was rife with increasingly complex threats and bold threat actors. One such surprise was the…

2 years ago

Here are 11 most common email phishing subject lines: Do your employees know?

Bad actors use the most common email phishing subject lines to target an organisation's employees in giving their credentials. This…

2 years ago

Business partnerships: Here are 5 reasons why you should forge one

Forging business partnerships are the best way to grow your business. Some benefits include extending the reach of each other's…

2 years ago

Responsible Vulnerability Disclosure: Fostering communication in the cybersecurity community

The CSA has come up with Responsible Vulnerability Disclosure (RVD) to improve cybersecurity and build a trusted and resilient cyberspace.…

2 years ago

Vulnerability in cyber security: When giants fall to attacks

The data breach incident at Sembcorp Marine underscores the truth that even giants have vulnerability in cyber security. What does…

2 years ago

5 Ransomware Singapore facts: What your organisation should know

Here are 5 ransomware Singapore facts that every organisation collecting, using, and disclosing personal data should know. 5 Ransomware Singapore…

2 years ago

How GDPR Singapore impacts businesses and its compliance

The GDPR may apply to organisations in Singapore if they offer goods or services to individuals in the EU or…

2 years ago

Why are Smart Contracts so important?

Smart Contracts have the potential to introduce radical change in the way businesses operate. Let's dig deep as its importance…

2 years ago

6 Email phishing examples: How to identify and avoid them

Organisations must be familiar with every email phishing examples to protect them from any infiltration attempts made by bad actors.…

2 years ago