Digital Signing Document Electronic

Digital Signing – Where Do I Start?

We’re on the brink of the Digital Era and soon approaching the post-Digital Era. Many things are slowly being replaced by technology. When ordering food, we will order it through food delivery applications. We book transportation through ride-hailing transport services instead of hailing a taxi from the street. Clearly, technology is an essential tool that we cannot avoid, it plays an

Read More
Corporate Banking Services

Engaging Corporate Banking Services Through Secure Electronic Signatures with nSignBasic

Engaging Corporate Banking Services Through Secure Electronic Signatures with nSignBasic In today’s context, with the dramatic global increase in digital transformation acceleration, there is an increasing need for businesses and individuals to switch to electronic signature solutions even in the banking industry. Banks, which are known to maintain hardcopy documents due to requirements and financial audits, have made changes to digitalize

Read More
Web Application Firewall WAF

Insure Against Attacks with Next-Gen WAF

Modern web application architectures have extended the attack surface. While, digitalization and automation have enhanced attacker effectiveness, leading to the continuous exploitation of known vulnerabilities like OWASP Top 10 and unknown threats. About 1 billion customers’ identities are being stolen, more than 10,000 security breaches occur every day, and over 90% of websites are in danger of cyberattacks. These data highlight

Read More
Everyday PKIs

The PKIs in Our Daily Life

Having worked closely with PKI for about 10 years, the question that is commonly thrown to me is, “Hey, which industry are you from?” typically, when I mention PKI, most people will not have heard of this term before. Although PKI may be a stranger to many of us, it is present in our everyday life and protects us when we

Read More
Workflow

Enhancing Your Business’ Workflow Process with Singpass Authentication Module (SAM)

Signing up for a new credit card; Logging in to HealthHub to check your vaccination status; Filling up registration forms on a kiosk. What do they have in common? All these processes have been simplified with the advent of Singpass services. The days of manually filling up forms are over as creating a new account is as easy as just one

Read More
Addressing the Security Gaps of Microsoft CA

Addressing the Security Gaps of Microsoft CA (ADCS)

In today’s Public Key Infrastructure (PKI) field, it is common to see organizations leverage on Microsoft Certificate Authority (CA) to build their internal PKI System. However, a lot of organizations are not aware of the security gaps that Microsoft brings to the table and what are the issues that might bring to them. In this blog, we will discuss the security

Read More
The-Right-Approach-to-Data-Encryption

The Right Approach to Data Encryption

With recent global events, many businesses are adopting, or at least temporarily accepting, a work-from-home model. Cybersecurity experts all over the world are raising the alarm about the increased threat of data breaches. Working remotely extends the data risk plane. While this is the right response to mitigate the current concerns, enabling a distributed workforce does come with its own set

Read More
Don’t Get Hooked By Phishing

Don’t Get Hooked By Phishing

Phishing is a kind of social engineering attack. Often it is a low-tech attack as opposed to high-tech attacks like security system hacking or password hacking. These malicious attacks employ psychological tricks to lead users into divulging sensitive information or unknowingly providing security access. The most common form of social engineering is email phishing. Steps perpetrators use: 1. Casting a wide

Read More
See More, Respond Faster with Trend Micro Vision One™

See More, Respond Faster with Trend Micro Vision One™

See More, Respond Faster with Trend Micro Vision One™ With the recent increase in cyberattacks due to the Russia-Ukraine conflict, it is more critical than ever to be aware of your organization’s security posture. The threat landscape is constantly changing, and as malicious actors are always using new tools and tricks, it becomes imperative for organizations to have visibility in their

Read More