As issues of fairness and sustainability boil over, a developer sabotages his open-source code in protest
The most important software that underpins so much of today's digital infrastructure…
Latest Log4j vulnerability a reminder of far reaching impact of software dependencies
In an interconnected digital world, where software runs everything, a flaw in…
Why it’s time for an AMD Ryzen PRO inside your next business laptop
AMD Ryzen™ PRO 5000 Series Mobile Processors now come with a range…
Half of Singapore SMBs hit by cyberattacks lost US$500,000 or more: Cisco
Forty per cent of SMBs in Singapore were hit by a cyberattack…
MyRepublic data breach, the latest to hit a Singapore Internet service provider, should raise alarms
These MyRepublic data breach and other recent ones are worrying enough for…
Twist in Poly Network heist, as hacker who stole digital coins says it was done for good
The hacker is believed to have overwritten the instructions on smart contracts…
What caused the data leak at StarHub, the latest telco to get hit?
As the StarHub data leak shows, efforts to mitigate a damaging incident…
Yet another supply chain cyberattack, now on Kaseya, should worry businesses
As yet another supply chain breach at Kaseya shows, the risk of…
Cybersecurity needs updating with hybrid workstyles but talent is hard to find
After they moved to the cloud in an unplanned or accelerated fashion,…
Businesses use the cloud to manage risk but are they also concentrating it?
As businesses rely more on public cloud providers to run their operations,…
As ransomware evolves, businesses need new tools to fight back
Businesses need the right tools and expertise to proactively hunt for threats…
In Singtel hacking case, lessons to be learnt on managing fallout
It is impossible to stop all cyberattacks, so how a business responds…
Log in to e-services by scanning your face, sending SMS to children for SingPass verification
By scanning their faces to verify their identity, SingPass users can sign…
Q&A: Collective defence will better combat cyber threats in polarised world, says IronNet
Despite technologies such as 5G and cloud being highly politicised today, there…
Cybersecurity should be built into your network
Fundamental changes have forced IT leaders to look to defence in depth,…
RedMart data breach a reminder of danger of forgotten pieces of data
The RedMart data breach has revealed one common vulnerability facing many businesses…
Successful digital enterprises must transform the WAN or security – or both
Combining an SD-WAN with cybersecurity helps maximise returns on investments on the…
DIY: Secure your home cameras by reducing exposure
You can't keep out all threats but you can reduce the risk…
Cybersecurity hygiene key to keeping cyber threats at bay, say experts
Cybersecurity hygiene is key to keeping out malware as organisations attempt to…
Google Meet, Gmail and other G Suite tools get security boost
Users of Google's online tools such as Meet, Gmail and Chat are…