fbpx

Latest cyber security publications


New year, new habits? Why this CISO reckons you need to change your security behaviours

The topic of breach normalisation has been examined heavily before, but most of the discussion has centred around its obvious, negative effect – the desensitisation and numbing of society to each passing incident.

Tangible effects are rarely immediately apparent in the aftermath of a breach. News reports consequently lack visceral impact. It’s not immediately clear where data ends up — users are inclined to think there is a high chance that their data, representing one line in a tomb of a database, might never be deployed against them.

“I’ve actually had journalists tell me this in the past. They would actually say it’s difficult for us to talk about because we don’t have a picture or video or something we can frame it against to capture people’s attention.”

But Pinkard also says there are also positive effects to the phenomenon.


CISO Interview: Does ‘breach normalisation’ have its benefits?

The topic of breach normalisation has been examined heavily before, but most of the discussion has centred around its obvious, negative effect – the desensitisation and numbing of society to each passing incident.

Tangible effects are rarely immediately apparent in the aftermath of a breach. News reports consequently lack visceral impact. It’s not immediately clear where data ends up — users are inclined to think there is a high chance that their data, representing one line in a tomb of a database, might never be deployed against them.

“I’ve actually had journalists tell me this in the past. They would actually say it’s difficult for us to talk about because we don’t have a picture or video or something we can frame it against to capture people’s attention.”

But Pinkard also says there are also positive effects to the phenomenon.


Researchers uncover major Bluetooth security flaw

A joint paper by researchers at Oxford University, Singapore University of Technology and Design and the Helmholtz Centre for Information Security (CISPA) called the issue “a serious threat to the security and privacy of all Bluetooth users”.

Named the Key Negotiation of Bluetooth attack, the weakness fools the pair into creating a relatively shorter encryption key, making it easier for hackers to crack.


Singapore Cybersecurity Consortium: On the frontline of today’s cyber battlefield
Ahead of her presentation at Cloud Expo Asia Singapore in October, Dr Vivy Suhendra, executive director at the Singapore Cybersecurity Consortium, dives deep into the consortium’s work to shore up Singapore's cyber resilience Cyber security is a constantly evolving field, and rapidly so. We need to not only keep pace with cyber threats in the... Read More

Proactivity needs to replace procrastination as the foundation of IT security

It’s easier than you think to operate a proactive security strategy, writes Jon Lucas For every business in today’s digital landscape, IT plays a vital role. Ensuring that systems and applications are working across all aspects of the company is not just an IT team’s problem, but something that the board should be involved in… Read More



Do NOT follow this link or you will be banned from the site!