This multi part article looks into the argument whether CISO is a True C or a False C role
read moreTrue C vs False C - Case study on the role CISO - Part 2
This multi part article looks into the argument whether CISO is a True C or a False C role
read moreTrue C vs False C - Case study on the role CISO - Part 1
This multi part article looks into the argument whether CISO is a True C or a False C role
read moreCISO on crosshair
This article looks into increasing liability of CISO in the industry.
read moreDigital Asset Series: Cyber Risk Management for Trustees
This articles looks into a framework to establish cyber risk management for digital asset trustees
read moreDigital Assets: Custodian vs Trustee[]()
This articles into digital asset custodians and the importants of its cyber risk management
read moreBarracuda ESG vulnerability
This article examines the recently released vulnerability affecting Barracude ESG
read moreCase Study - MySejahtera Data Breach
This article is the case study for the MySejahtera data breach
read moreASEAN publicly vulnerable devices
This articles looks into the recent ShadowServer report on ASEAN publicly vulnerable devices
read moreMOVEit Transfer Zero Day and Cl0p
Continuing from previous week, further analysis of the zero day and ransomware group Cl0p
read more