Blog
Embracing Compliance with effective security solutions
Highlighting the key updates in regulations, industry guidelines and international standards like ISO 27001 and MAS, learn more about the security solutions organisations can leverage on, to align and support their compliance efforts.
5 Common Findings of Cybersecurity Tabletop Exercise
Cybersecurity table-top exercise (TTX) is a tailored scenario crafted towards all stakeholders involved in a War Room situation, simulating real-world cyber incidents response. Let’s explore the most common findings in a TTX engagements.
Endpoint Security | Bolstering Protection Beyond Perimeters
The paradigm shift towards remote work and implementation of Bring Your Own Devices (BYOD) policies has introduced new challenges for endpoint security. Find out more about strategies to secure your digital frontier – endpoints.
The Benefits of Cybersecurity Table Top Exercise
Cybersecurity table-top exercise (TTX) is a tailored scenario crafted towards all stakeholders involved in a War Room situation, simulating real-world cyber incidents response. Let’s explore the benefits of a cybersecurity tabletop exercise.
Event Recap: The Bigger & Better Bash
It is our pleasure and honour to have you join us in our celebration of this exciting milestone, Privasec, Now A Sekuro Company, and we are grateful for each and everyone of you who have supported us on this journey. Packed with an eventful programme lineup featuring valuable sharing from our clients, partners, various leaders of the industry and distinguished guest speakers, check out our event recap below.
The new ISO 27001:2022 to address modern cybersecurity challenges.
ISO 27001:2022 has been recently released. Check out this blogpost and find out the key updates in the revised standard.
Privasec – 2022 Year in Review
As 2022 draws to a close, join Privasec in this quick recap of the past year. We look forward to another year worth celebrating!
Meet Your Compliance Needs with ISO 27001 Certification
With the implementation of an ISO 27001 certified Information Security Management System (ISMS), organisations can demonstrate and provide security assurance, where security policies, processes and procedures are put in place to secure the information assets.
Inaugural Cyber Risk Meetup in Manila | Philippines Chapter
Proudly supported by Sekuro and Privasec Asia, we are proud to share that our first-ever Cyber Risk Meetup in Manila, Philippines was a great success! It was an honor to have HK Yu PSM, the Australian Ambassador to the Philippines as she discussed the importance of stepping up capability-building initiatives between Australia and the Philippines, which is crucial in ensuring cyber resilience and prosperity. We are greatly appreciative for our panel speakers – Charmaine Valmonte, Mel Migrino, and Jan Encina’s thoughtful sharing of their distinct experiences and opinions on cyber maturity and company resiliency. Additionally, it was pleasant to have Frida Tan, the Philippines’ new chapter lead for Cyber Risk Meetup to host the panel discussion and Prashant Haldankar for moderating it. We express our sincere gratitude to all our partners, Australian Trade and Investment Commission (Austrade) and MySecurity Marketplace, for making the event an excellent success. Panel Discussion | Key Takeaways Our panel evaluates the need to reframe their roles to regain control of organization risk and thrive in this ever-growing business environment. Without finding a means for the IT professionals, cyber experts, risk managers, and business people to communicate in a common language, resilience cannot be built. Without …
Benefits of ISO 27001
With the implementation of an ISO 27001 certified Information Security Management System (ISMS), organisations can demonstrate and provide security assurance, where security policies, processes and procedures are put in place to secure the information assets.
Understand Red Teaming
Our Red Team Lead, Justin Chong, sheds light on Red Teaming in the InfoSec World. The engagement tests and assesses the various aspects of an organisation’s overall security , providing a better understanding of its environment and the effectiveness of its security controls.
Cyber Threats Today
In a world full of costly data breaches and invasive privacy incidents, Singapore is not immune. It’s not just the big threats such as cyber criminals, nation-state hackers and cyber espionage—even simple employee mistakes can end up exposing private data and costing your organisation millions.
To combat the growing wave of privacy and cybersecurity issues, Singapore passed the Personal Data Protection Act (PDPA) 2012. These regulations are complemented by the Data Protection Trustmark (DPTM), a voluntary certification that helps organisations demonstrate that they have appropriate protection and privacy practices in place to guard their personal data.