-
Threat intelligence has become an integral component of cybersecurity strategies today, giving organisations the insights they need to anticipate and counter threats. As enterprises move away from a prevention-only approach, having the right threat intelligence allows Secops teams to focus on real threats by prioritising alerts and reducing noise. Here’s why threat intelligence is playing such a pivotal role.
-
The basic firewall and antivirus protection of the past has expanded into a diverse, multifaceted ecosystem, reflecting the growing complexity of the solutions designed to combat modern cyber threats. Here’s how channel partners can help CISOs manoeuvre the labyrinth of security solutions and integrate them.
-
Enterprises in the Asia Pacific are doing a much better job of discovering cyber intruders today, but the impact of breaches is worsening with continued digital transformation, according to the Mandiant M-Trends 2024 report. How else is the cyber landscape changing, and what does it mean for enterprises and governments?
-
From mobile apps, enterprise networks, and the pumps in water treatment plants, countless digital systems drive our world today. As the threat landscape expands to encompass everything, how can we integrate security into the heart of our digital systems from the beginning, with customer protection in mind?
-
The rapid pace of technological development and rising patient expectations are driving significant transformation within the healthcare industry. Can technologies like robotics and AI address the most pressing needs of today’s patients?
-
Once an afterthought, cybersecurity is now recognised for its vital role in ensuring business continuity and integrity. How has the cybersecurity landscape evolved in recent years, and how can enterprises ensure they are well-equipped to defend against both current threats and future challenges?
-
CISOs are overworked and hard-pressed on every side, leaving them with little time to explore new strategies and cutting-edge technologies to transform their security postures. Are there proven technologies and advice that can ease cybersecurity leaders’ workloads to focus on strategic initiatives? Three cybersecurity leaders weigh in.
-
As technology advances and new tools emerge, cyber adversaries are adapting and using them to bypass defences and exploit weaknesses. The only way organisations can achieve different outcomes is by thinking and doing things differently, adopting new technologies for defence before attackers do – to thwart attacks and address traditional gaps.
-
As cyberattacks like ransomware, phishing, and distributed denial-of-service (DDoS) attacks become more sophisticated and common, how can organisations ensure they remain operational and recover quickly from cyber disruptions? We speak to three cybersecurity experts about how CISOs can build cyber-resilient defences for these uncertain times.
-
As businesses intensify their digital transformation efforts to stay competitive, many find themselves confronted by a growing array of sophisticated cyberattacks that challenge traditional defences. In the face of evolving cyber threats, enterprises must consider a broader spectrum of solutions. How can businesses harness cutting-edge cyber security innovations and leverage the power of telco data to fortify their defences?
-
While much is discussed about commercial considerations around AI deployments, less attention is given to the cybersecurity implications of AI. Yet cybersecurity is a critical concern given how AI systems are attractive targets for cyberattacks due to their inherent complexity and reliance on vast amounts of data. How can organisations prepare the ground for generative AI. And how can they find the right balance between innovation and resilience, effectively leveraging AI to leapfrog ahead? Read on to learn more.
-
Cyberthreat actors have continually sought to create new malware and find novel ways to embed harmful elements within files, using them as a medium to infiltrate and compromise enterprises. The situation is worsened by the ongoing convergence of traditional IT networks with Operational Technology (OT) networks. But while enterprises have turned to antivirus software, single anti-malware engines are no longer sufficient against the sheer volume of threats. How can organisations protect their increasingly complex environments from file-borne threats, including threats that don’t currently exist? Read on to learn more.
-
Ransomware is evolving rapidly, posing significant threats to businesses worldwide. To defend against this digital menace, traditional cybersecurity measures are no longer enough, especially as some ransomware variants are known to target data backups. To withstand increasingly sophisticated ransomware threats, businesses can no longer rely on outdated security measures. They must adopt a comprehensive, multi-layered approach to cybersecurity that encompasses everything, including their storage systems. Read on to learn more about how organisations can build ransomware resilience.
-
As cyber threats proliferate and the frequency of cyberattacks grows, organisations must prioritise their ability not just to thwart them but also to recover and ensure business continuity. However, building strong cyber resilience is easier said than done due to a fragmented approach to managing digital systems and the diverse environments of modern IT deployments. A new approach is required for cyber resilience. To be effective, such an offering must be comprehensive without placing onerous demands on the cybersecurity team and provide around-the-clock coverage. Read on to learn more about Cyber Resiliency as a Service (CRaaS).
-
In the ever-evolving landscape of cybersecurity, is AI a formidable ally, an emerging cybersecurity headache, or both? We spoke with Damian Leach of Seaco, who shared some possible pitfalls of AI in cybersecurity and how organisations can get the most out of it. He also discusses key questions the CISO must ask when evaluating an AI-powered cybersecurity solution – and why the human is not replaceable.
-
The convergence of AI with cybersecurity and the rapid evolution of technology is blurring the boundaries in cybersecurity. At GovWare Focus in July, over 150 cyber leaders came together to discuss how the rapid adoption of new tech has profound implications for the evolution of leadership roles and business innovations, compliance considerations, and how to build greater cyber resilience in today's complex threatscape, with a lens on CII sectors.
-
Cybersecurity teams have their work cut out for them when acquiring new cybersecurity solutions. They must juggle multiple tasks simultaneously, including resisting pressure from internal stakeholders, conducting proof-of-concept evaluations, collaborating with vendors, and keeping users appeased. How can cybersecurity leaders navigate the chaos and emerge with the right tools? We speak with Hoo Chuan-Wei, CISO of StarHub and Yaron Slutzky, CSO of Agoda on this important but rarely-talked-about topic.
-
Instead of focusing solely on business-centric benefits, customers and associated stakeholders should be the primary considerations for the design of digital applications, says Ng Hoo Ming, President of the ASEAN Chief Information Officer Association (ACIOA). We spoke with him about the importance of trust in an evolving digital landscape, why businesses have a responsibility to adopt a consumer protection by design mindset, and what they can do to better protect their customers.
-
How has the role of the modern-day CISO evolved, and what do we really expect of a good CISO? Angel Redoble, the Chairman and Founding President of the Philippine Institute of Cyber Security Professionals (PICSPro) says hiring the right CISO is crucial, but it is equally important that organisations empower them with the resources and authority to succeed. In this candid interview, Redoble talks about balancing cyber with business realities, accountability, burnout – and why a CISO is a noble job that is not for the faint of heart.
-
It is now nearly four years on from a pandemic that gripped the world and catalysed digital transformation in both the private and public sectors. In the intervening years, we have seen governments prioritise the rollout of online services and transactions, establish online sources of truth, and develop digital health initiatives. More recently, new focus areas have emerged in 2023. GovInsider highlights the five trends that have dominated the digital government scene in Asia-Pacific in the year just past. These range from the implementation of artificial intelligence to a sharpened focus on digital sovereignty as means to safeguard sensitive data.
-
In an era where data is regarded as the crown jewels of an organisation, how can businesses ensure the sanctity of their data, especially as cybersecurity practitioners have largely given up on a citadel approach and now actively plan for the eventuality of a breach? We speak with Ilias Chantzos, the Global Privacy Officer and Head of EMEA Government Affairs at Broadcom for his take on the evolving nature of data, what happens after a data breach, and how organisations can better protect their data.
-
The fluid cybersecurity landscape is continually changing as new technologies are introduced and novel threats emerge. As unique attack vectors surface, CISOs must stay updated and swiftly adapt their defences to tackle these new and evolving challenges. We ask Leonard Ong, Director, Cyber Defense Group at Synapxe and Ron Green, Cybersecurity Fellow at Mastercard about their thoughts on the changing digital landscape and what CISOs can do to strengthen their security posture and stay ahead of bad actors.
-
Would you know if a cyber adversary were to successfully break into your organisation? There are more threats than ever in today’s digital environment, and attack surfaces are constantly expanding due to the widespread adoption of cloud services, remote work, and complex hybrid cloud deployments. Threat defence today isn’t focused on protecting against attacks alone, but about preventing them from making inroads and wreaking havoc. Here’s how Network Detection and Response (NDR) can help organisations gain better visibility into their environments and detect threats early.
-
Leadership acumen and the ability to effectively engage with stakeholders are some of the key competencies expected of government chief information security officers (CISOs), shared GovTech Singapore’s speakers at GovWare 2023 as part of the Singapore International Cyber Week. Tham Mei Leng, CISO for the Ministry of Sustainability and the Environment (MSE), shared how she leads MSE in tackling its unique cybersecurity challenges while embracing digitalisation, while Soh Zhi Qi, Assistant Director with GovTech Singapore, shared how the agency drives a whole-of-government approach to tackling cybersecurity threats, GovInsider reports.
-
No cyber defence is perfect. With enough time, technical sophistication, and a sufficiently motivated attacker, even the strongest defences may fail. Enterprises need a robust plan and relevant capabilities that will allow them to respond quickly should attackers ever gain unauthorised access. Indeed, the Mandiant 2023 M-Trends report shows that attackers in the Asia Pacific are gaining access using old footholds. What are the top considerations in incident response and how can organisations ensure that threat actors are fully rooted out?
-
How will AI influence cybersecurity? At GovWare last month, a stellar line up of presenters discussed cutting-edge AI research, the potential impact of AI on cybersecurity, and how some of them are already using it. Read on to learn more about what Kunal Anand of Imperva, Scott Jarkoff of Crowd Strike, and Professor Yu Chien Siang of Amaris AI have to say.
-
Trust was a recurrent topic at GovWare 2023, attended by a record 12,000 global cybersecurity practitioners, policymakers, and organisational leaders from some 80 countries who came and engaged in three days of meetings, mutual discussions, and learning. But what is the role of trust, and how can cybersecurity practitioners find the right balance when investing in cybersecurity amid a constantly evolving digital reality? Here’s what panellists and conference participants have to say.
-
The cloud is part and parcel of practically every organisation today and multi-cloud deployments are increasingly a must-have. But as organisations turn to cloud collaboration, how should organisation balance access with trust and data security? At the invite-only roundtable titled “The Paradox of Trust: Balancing Data Security and Cloud Collaboration” at GovWare 2023, cybersecurity leaders gathered to share their experiences.
-
When your house is burning, first respondents need to know exactly where everything is when they arrive. The same is true for cyber respondents in the immediate aftermath of a cyber incident. While busy executives rarely spend much time thinking about the threat of cyber incursions, proper preparations and an incident response retainer with a reputable provider can grant timely access to the right expertise to quickly and efficiently identify the source of the attack and mitigate its impact. Read on to learn more.
-
As the world races ahead with digital transformation and AI in practically every industry sector, how can the healthcare industry leverage technology to modernise and innovate? iAPPS Health Group believes its 1Doc app, Capsule Clinic, and Robot Pharmacy can deliver better patient outcomes and push the boundaries of healthcare.
-
The need for secure systems and networks has become more vital than ever in the face of sustained digital transformation and substantially larger attack surfaces. Here’s how a prevention-first approach, with multi-layered security that covers all aspects of an organisation's infrastructure can make a difference.
-
Today’s CISOs wear multiple caps and are multifaceted in their abilities. How has the role of the CISO evolved and how they can shore up their organisation’s cybersecurity fundamentals amidst a roiling, tumultuous threat landscape? Crucially, what does the road ahead look like?
-
As cyber threats grow in sophistication, organisations can no longer rely on worn old strategies, but must adapt their security strategies to secure their cloud deployments and defend against new malware. With our three distinct platforms powered by ML/AI, organisations can leverage machines to mitigate personnel shortages and bridge knowledge gaps.
-
As mobile devices become indispensable tools in the workplace, how can enterprises manage these devices and strike the right balance between user experience and security? Amid the changing role of mobile devices, here are some ways enterprises can better secure them.
-
Imagine a future where smart medical devices monitor our health around the clock, leveraging AI to detect health issues early. These devices provide timely intervention, helping us stay healthy from the comfort of our homes.
-
Traditional security tools often operate in silos, making it difficult for organisations to piece various alerts together for a complete picture of their security environment. Collecting and correlating data from multiple security layers, XDR can detect threats that may go unnoticed by standalone security tools. The right XDR solution can help organisations overcome the limitations of siloed security tools and tackle today’s dynamic cyber threats. Here’s what XDR can do and how you can benefit from it.
-
As new applications are rolled out on the disparate mix of systems employed by organisations, businesses invariably find themselves grappling with hurdles around deployment, monitoring, and security. As apps become more fragmented and distributed across different environments, how can enterprises bridge the gap to achieve true application portability and fully secure their APIs?
-
As the digital world rapidly evolves, CISOs around the world face the tough challenge of defending their organisations from a constantly expanding range of cyber threats. How can CISOs balance forging ahead with innovation and maintaining security?
-
Every organisation today is inextricably connected within a vast web of intricate dependencies. Consider the hundreds of digital devices in a typical office. From laptops to servers, networking appliances to office printers, every one of these devices is built by an external party. These products incorporate hundreds, sometimes thousands, of components sourced from a revolving door of suppliers, who might in turn rely on their network of sub-suppliers. The result is a complex, fluid supply chain laden with a myriad of invisible risks – and where a single weak link could potentially compromise the entire system.
-
Securing an organisation's assets in today’s increasingly complex landscape has never been more challenging. Modern digital environments are incredibly diverse and extend across a multitude of platforms – from traditional IT assets to public clouds and containers, SaaS applications, mobile devices, and more. As conventional approaches to asset management prove inadequate in the face of this complexity, how can cybersecurity leaders gain a clearer view of their entire digital landscape to properly secure them?
-
From temporary disruption to potentially causing massive financial damage and irreparable harm to reputation, cyber security has evolved into a strategic priority that can make or break a business. As digital systems become even more sophisticated and interdependent, organisations must do more to adapt and fortify their defences to protect sensitive data, maintain customer trust, and safeguard their bottom line. This means understanding the new dangers and adopting a reinvigorated approach to cyber security.
-
The relentless pace of technology development is often tailed by the emergence of new cyber threats. Organisations must remain vigilant against these dangers, as they navigate uncharted waters such as generative AI and impending paradigm shifts driven by quantum computers. Christopher Painter of the Global Forum on Cyber Expertise Foundation and Professor Lam Kwok Yan of the Nanyang Technological University share their thoughts about defending against new technological threats and why cybersecurity is the foundation for innovation.
-
Ransomware has grown rapidly into a global scourge that affects businesses and government agencies alike. The counter ransomware initiative was set up to combat this scourge by bringing together experts in cybersecurity, law enforcement, and policymaking. As countries – including Singapore – mobilise their resources, Stéphane Duguin, CEO of the CyberPeace Institute, explains how modern ransomware groups work, the threat they pose, and the challenges faced by law enforcement as they tackle this growing threat.
-
CISOs today are confronted with complex, constantly evolving cybersecurity challenges. At GovWare Focus, cybersecurity leaders met with their peers, partners, and policymakers to discuss a broad range of topics, including the importance of collaborative defence, automation, and focusing on the basics when securing networks.
-
Complying with relevant cybersecurity standards and best practices can significantly bolster an organisation's cybersecurity posture. But how can businesses ensure that their plans are correctly implemented, and how can they tell when standards or best practices are not correctly applied? We speak with Siddharth Deshpande of Palo Alto Networks on how organisations can operationalise cyber best practices and establish trust with internal stakeholders.
-
Cybersecurity standards are hardly new and are used by organisations to enhance their security posture and mitigate cybersecurity risks. We speak to a CISO and a Director of Digital Policy to learn how regular stakeholder communication, adopting a common language, and fostering an environment of trust are essential when deploying cybersecurity standards.
-
As Southeast Asian countries digitise and deploy Operational Technology (OT) for managing critical infrastructure, the interconnected nature of these systems poses potential risks. What proactive measures can organisations and governments take to mitigate these dangers? Andre Shori, APAC CISO of Schneider Electric explains the dangers and offers some suggestions on how smart cities can enhance their readiness and resilience.
-
Attacks against OT networks have not abated but have instead grown in sophistication and impact. How can we increase the security of OT systems and where do we start? John Lee, the Managing Director of the Global Resilience Federation shares his insights about the escalating risks and offers potential solutions to fortify OT security in our interconnected world.
-
The rise of artificial intelligence in various applications has put the spotlight on the importance of data protection. As artificial intelligence becomes increasingly integrated into a range of applications, from chatbots to decision systems, Professor Lam Kwok-Yan highlights the need for robust data protection measures to address potential risks in the ever-evolving AI environment. He talks about the importance of maintaining a balance between innovation and security, and how organisations can successfully navigate the evolving AI landscape while safeguarding their valuable information.
-
AI technologies like ChatGPT pose significant cybersecurity risks, including deep fakes, enhanced phishing attacks, and disruption of operational systems, says Luis F. Gonzalez, the Chief Data and AI Officer at Aboitiz Power. And CISOs who remain uninformed about the capabilities of AI risk being caught unprepared. He speaks to us about how cybersecurity leaders must adapt quickly to AI-enabled threats, develop an understanding of AI, and utilise it as a defense mechanism to effectively protect their organisations.
-
Collaboration between the public sector and private companies is essential for effective cybersecurity. But how are public-private partnerships relevant, and how can the cybersecurity industry band together against new threats? At the CXO Plenary held at GovWare 2022, representatives from Google Cloud, Eclypsium, and the Cyber Security Agency of Singapore (CSA) shared their thoughts about the erosion of the traditional perimeter and the role of partnerships in this era of digital transformation.
-
Why do security problems seem to be getting worse despite years of increasing spending on cyber security solutions? Can a Zero Trust approach help organisations deliver better outcomes? Drawing on his 25 years of experience in the cyber security industry, Gary Gardiner lays out what is Zero Trust, common misconceptions, and why we should seriously consider implementing it. Read about it here.
-
Cyber security threats are increasing rapidly with the proliferation of new smart devices and apps. What’s more, the most valuable and innovative workers are resisting a return to the corporate office, exacerbating the fraud cyber security situation. At the CLOUDSEC @GovWare keynote, Steven Hoffman of Founders Space shared about the workforce of tomorrow and how human-centric cyber security can protect and educate us in real-life situations. Read about it here.
-
As employees increasingly shuttle between the home and office, the new perimeter is not bounded by the network, but by each employee in the organisation – wherever they might be. To stay secure, businesses must move beyond a perimeter security mentality and take steps to strengthen their cybersecurity posture through solutions that incorporate identity and access management (IAM) and governance control. Find out more here.
-
Nation states are increasingly engaging in sophisticated cyberattacks amid growing global tensions and armed conflicts. Where will this lead, and what is the role of the ongoing pandemic and growing adoption of hybrid work on cybersecurity? At GovWare 2022, four panelists came together to share their insights about the security implications of hybrid work, cyber conflicts, and how countries can get together to shape responsible cyber security behaviours. Read what they have to say here.
-
With a myriad of cybersecurity offerings and services on the market, how can organisations know which are reliable and secure? Rowland Johnson, President of non-profit CREST International sees accreditation as one of the solutions.
-
The seventh edition of the annual global cyber gathering will see the Cyber Security Agency of Singapore announcing key strides they are taking to stay one step ahead of rising cyber threats.
-
JP Yu, Head of APAC Sales from software provider NetWitness, breaks down the most pressing cyber threats, and why extended detection and response (XDR) is increasingly the choice cyber solution for governments to build up their cybersecurity defences.
-
Singapore’s central bank, the Monetary Authority of Singapore, has laid out its vision for the next three years. Cybersecurity and trust in financial services will be critical towards achieving the nation-state’s ambitions, says Vincent Loy, Assistant Managing Director, Technology Group, MAS to GovInsider.
-
Google is one of the most-used site in the world. But how does the tech giant keep its tens of billions of users safe from cyber threats? Michaela Browning, Vice President of Government Affairs and Public Policy in Google Asia Pacific, sheds light on the matter.
-
Joep Gommers, Founder and CEO of cyber threat intelligence firm EclecticIQ, explains why intelligence sharing is an indispensable part of a country’s cybersecurity strategy.
-
Constantly changing digital realities and a shrinking talent pool continue to pose a security challenge for organisations, but cybersecurity provider Forescout believes automation may be the solution.
-
GovInsider sits down with two cyber experts ahead of GovWare 2022 to find out how events like the Russia-Ukraine war are impacting the cyber landscape today, and what can be done about it.
-
Juliette Wilcox CMG, Cyber Security Ambassador for UK Defence and Security Exports, Department for International Trade, United Kingdom, explains how her role as a cybersecurity ambassador can strengthen cybersecurity in the United Kingdom and beyond.
-
Alan Phua, Head of Cyber Security from Singaporean telecommunications conglomerate Singtel, explains how the single pane of glass can provide visibility over hyperconnected environments and improve the cybersecurity posture of public and private sectors.
-
As organisations seize the opportunities presented by 5G and embark on digital transformation in today’s climate of volatility, uncertainty, complexity and ambiguity, new vulnerabilities are being created, increasing the risk of cyberattacks. The ability to unify telco and security workflows will be a critical differentiator in the security space. Singtel shares how organisations can strengthen their security posture and transit confidently to embrace new and advanced technologies in the hyperconnected era.
-
Threat actors are continuously probing for gaps and weaknesses to exploit, while cyber defenders must face down new threat vectors and a rising cadence of attacks. How is the threatscape evolving, and is the role of a Zero Trust strategy today? David Ng, Head, Group Technology Information Security Office, OCBC, and Group Professor Yu Chien Siang, Chief Innovation and Trust Officer, Amaris.AI share their views.
-
Threat actors are adapting and innovating at a faster pace than ever, driven by the prospect of monetary gains and the pervasiveness of digital systems today. What do future cybersecurity threats look like, and how can organisations better defend themselves against them? We speak to Huang Shao Fei, CISO, SMRT Corporation, and Professor Lam Kwok Yan, at the Nanyang Technology University to find out more.
-
Interview with Henry Pearson, UK Cyber Ambassador. What was once private has burst out into the open. National cyber attacks, and widespread cybercriminal activity, are an almost weekly national news headline nowadays. In the past month alone, two hospitals - Düsseldorf University Hospital, Germany and Universal Health Services, USA - have been attacked with ransomware, disabling their systems, preventing them from treating patients, and causing a fatality. The international system has yet to create a digital version of the Geneva Convention, regulating cyberspace to ensure a safer future for us all. But nations are at least starting to partner, and recognise the scale of the challenge ahead ...
-
Leadership lessons from a retired Federal Bureau of Investigation Associate Deputy Director. How many times in this pandemic have you googled COVID-19 stats, or searched for the latest news from your home city? You are not alone, but you could be at risk of cyber attacks. Fake sites have been set up to create "drive-by" cyber infections, warns Thomas Harrington, a retired Federal Bureau of Investigation (FBI) Associate Deputy Director and Citi Managing Director. This is just one of the new threats facing us, he believes. Harrington spoke with GovWare about the cyber threat landscape, and how a new generation of “cyber warriors” can keep us secure. Invest in intelligence “COVID-19 has drama ...
-
Telecommuting, albeit comfortable, has opened up a dark pit where cyber monsters lurk to steal critical data. How do governments and organisations respond? What is there not to love about the new telecommuting arrangements when you can work in your pyjamas and messy room, answer emails from your bed, wake up late, and take tea breaks as often as you like? Sorry, but there is one thing – cybercriminals poised to exploit this otherwise comfortable "work-from-home" (WFH) setup. There is increasing evidence of cyberattacks and data fraud happening more frequently during the pandemic, as cybercriminals have been capitalising on the growing anxiety and vulnerabilities of remote working. Government ...