Category: Editors Desk

Cyber data protection and security in Formula 1

Cyber data protection and security in Formula 1

The Singapore GP, which took place from 14th Sept to 17th Sept, on a floodlit street circuit against a backdrop of historic landmarks and glittering modern skyscrapers, is also famed for its off-track action. Memorable headline acts such as Bon Jovi, Lady GaGa, Shikira had entertained the Padang crowd in the past, and highlights this […]

Global Port Security Spend Boosted by Port Upgrades and New Terminal Developments

Global Port Security Spend Boosted by Port Upgrades and New Terminal Developments

Technology deployment driven by persistent threats, finds Frost & Sullivan’s Security team With 90 per cent of global trade being carried out by the shipping industry, port security is of paramount importance. As vessel traffic continues to increase, the infrastructure will need to be developed. While a number of ports are in the process of […]

Transition Plans for Key Establishment Schemes using Public Key Cryptography

Transition Plans for Key Establishment Schemes using Public Key Cryptography

Summary: NIST guidelines on approved public key key-establishments schemes are specified in the NIST SP 800-56 series of publications. While legacy key establishment schemes have been programmatically allowed for use by agencies in FIPS 140-validated modules, NIST SP 800-131A Rev. 1, Transitioning the Use of Cryptographic Algorithms and Key Lengths, specifies that only schemes specified […]

Terrorism Insurance: Understanding the Boundaries of Coverage for a Risk Without Borders

Terrorism Insurance: Understanding the Boundaries of Coverage for a Risk Without Borders

Terrorism risk insurance, whether through traditional or stand-alone policies, is an increasingly important element of domestic corporate insurance programs, according to a new RIMS Professional Report titled, Terrorism Insurance: Understanding the Boundaries of Coverage for a Risk Without Borders. Authored for RIMS by Micah Skidmore of Haynes and Boone, LLP, the report provides corporate risk […]

Building a modern security operations centre

Building a modern security operations centre

How to protect your organisation’s information Security Information and Event Management (SIEM) technologies are not new, but there remains plenty of misinformation and misunderstanding about how to use them. Critics focus on them being little more than log collector and storage tools, that due to their management overhead, gives little in the way of return […]

The ASX 100 Cyber health check report - What’s next for your board?

The ASX 100 Cyber health check report – What’s next for your board?

The Australian Stock Exchange (ASX) and Australian Securities and Investment Commission (ASIC) along with the “Big 4” accounting firms have released the ASX 100 Cyber Health Check Report ASX Report PDF to establish a baseline in cyber security via a high-level “health check”. I commend the ASX and ASIC and the other participating companies for […]

Navigating the IT landscape of the future: The cultural shift your business needs

Navigating the IT landscape of the future: The cultural shift your business needs

The future IT landscape is scary for businesses of today, but it is certainly not insurmountable. Naturally, as the value of data to people and organisations grows, ransomware attacks, data theft and extortion will also continue to be on the rise. But the threats are not just perpetrated through stealthy backdoor tactics, in fact, according […]

Philippines connect and cyber security

Philippines connect and cyber security

The newly-formed Department of Information and Communications Technology (DICT) of the Philippines has been directed to craft a National Broadband Plan (NBP) to further improve the connectivity in the Philippines, with proposed plans for better internet connections and free WiFi. Co-organised by DICT and CommunicAsia 2017, the half-day Philippines Connect seminar on 24th May 2017 […]

Cyber security of assets in the interconnected era

Cyber security of assets in the interconnected era

Held at the Singapore Marina Bay Sands Convention Centre, the Smart Facilities Management Solutions (20th -21st July 2017), the International Association of Privacy Professionals (IAPP) Asia Privacy Forum (24th – 25th July), and the RSA Conference Asia Pacific & Japan (26th-28th July) shone the spotlight on the pivotal role of CyberSecurity in technology-driven conversations today. […]

Cyber threats to consumers: From credit card to ransomware

Cyber threats to consumers: From credit card to ransomware

The half-day Ransomware seminar at the RSA Singapore 2017 conference dived into the latest waves of attacks in Cyber Space. Through innovative research, case studies and panels, the seminar discussed and offered insights into the technical, policy, compliance and economics of the issue and the underground economy – its motivation, actors and organisations, and impacts […]