This article looks into red teaming cyber operations
read moreThe Mergers and Acquisitions Tightrope Walk: Why Cybersecurity is Your Invisible Safety Net
This article looks into the cybersecurity aspects of M&A
read moreThe Hidden Costs of Convenience - A Privacy Audit of Truecaller and Whoscall
This article looks into the use of third party apps to identify caller such as Whoscall or TrueCaller
read moreThe Financial Impacts of Cybersecurity Breaches: A Comprehensive Overview
This article looks into the debate between to do or not to do for cyber investments
read moreCyber TechTalk - Latest trends in Cryptography and Encryption Technologies 2024
This article looks into the current trends in cryptography
read moreMiddle Management Musing - Emerging Cyber Threats 2024
This article looks into middle management emerging cyber threat management for 2024
read moreCyber Breach Incident Response: Data Breach Edition - An ISO-Based Approach
This article looks into incident handling when dealing with data breaches
read moreLeadership in Crisis: Managing Cybersecurity Breaches at the Executive Level
This article looks into maintaing and being a leader while handling a cyber crisis
read moreCase Study - OCBC Singapore Phishing Incident
This article presents the case study on OCBC phishing incident
read moreUnveiling the Shadows: A Deep Dive into SIEM Rule Evasion in Cybersecurity
This article looks into threat actor methods in evading SIEM
read more