Secure Code Cybersecurity

How to Secure Code

Given the ubiquitous nature of information technology, anyone can pick up a computer, watch a tutorial, and start coding. This individual may then hone their skills via formal education or informal means such as boot camps and short courses, and eventually go on to create a career out of the skills they acquired. And despite having spent hours upon hours honing

Read More
Cyber Disaster Cyber Security CyberSecurity SecurityBreaches Hackers

Preventing Cyber Disaster from Occurring in Your Organisation

I was planning to write my opinions about the breach on Optus when I read about the news that Telstra was under attack as well. In case you are unaware of what has happened, in late September 2022, Optus released a statement that it was “investigating the possible unauthorised access of current and former customers’ information”. It has been further revealed

Read More
Vulnerability Management

Understanding the Importance of Vulnerability Management

In the ever-changing market for cybersecurity today, organizations rely on numerous software solutions and applications which are either developed in-house or from other IT service providers to remain on the top of the curve. While these options help improve the efficiency of the system as well as experiences for both employees and customers, it is also prone to vulnerabilities that can

Read More
Encryption Secure Email Encrypt Key Secure Key PKI

Email Encryption from Then to Now

Security Existence From Before – In ancient times, mails were encrypted by way of sealing wax as this not only protected the integrity of the mail, but also for tamper-proofing. A cracked seal would indicate a compromise of the document before reaching the intended recipient. In addition to the function of the wax seal, it was utilized as a source of

Read More
Digital Signing Document Electronic

Digital Signing – Where Do I Start?

We’re on the brink of the Digital Era and soon approaching the post-Digital Era. Many things are slowly being replaced by technology. When ordering food, we will order it through food delivery applications. We book transportation through ride-hailing transport services instead of hailing a taxi from the street. Clearly, technology is an essential tool that we cannot avoid, it plays an

Read More
Corporate Banking Services

Engaging Corporate Banking Services Through Secure Electronic Signatures with nSignBasic

Engaging Corporate Banking Services Through Secure Electronic Signatures with nSignBasic In today’s context, with the dramatic global increase in digital transformation acceleration, there is an increasing need for businesses and individuals to switch to electronic signature solutions even in the banking industry. Banks, which are known to maintain hardcopy documents due to requirements and financial audits, have made changes to digitalize

Read More
Web Application Firewall WAF

Insure Against Attacks with Next-Gen WAF

Modern web application architectures have extended the attack surface. While, digitalization and automation have enhanced attacker effectiveness, leading to the continuous exploitation of known vulnerabilities like OWASP Top 10 and unknown threats. About 1 billion customers’ identities are being stolen, more than 10,000 security breaches occur every day, and over 90% of websites are in danger of cyberattacks. These data highlight

Read More
Everyday PKIs

The PKIs in Our Daily Life

Having worked closely with PKI for about 10 years, the question that is commonly thrown to me is, “Hey, which industry are you from?” typically, when I mention PKI, most people will not have heard of this term before. Although PKI may be a stranger to many of us, it is present in our everyday life and protects us when we

Read More