On the 26 November 2014, Nanyang Polytechnic conducted the annual day camp for students looking to join the school’s prestigious Cyber Security and Forensics Course. Conducted over one day, the students from various secondary schools were engaged in many different activities that gave them a broader understanding of the course here in Nanyang Polytechnic. If you missed the day camp, fret not! Nanyang Polytechnic will be having the open house next week, from the 8 to 10 January, be sure to pre-register here! Continue reading
As the year approaches a closure, ISACA Singapore Chapter hosted the annual Member’s year end dinner. On the 25 November, hosted at Starz Restaurant, Hard Rock Hotel Singapore, ISACA members in Singapore gathered around together for one annual gathering for a dinner. Apart for an exclusive opportunity to network with fellow ISACA Members, we also got to enjoy a sumptuous spread of international cuisine. Continue reading
Infoblox, together with transition systems released this useful informatics recently. It is of no surprise that Enterprise Services, comprising of Business Services, as well as Commerce which comprises of Retail, are the top industries that are being targeted. The threat of Denial of Service is ever growing, and where the front-end is protected, we should not forget about the back end that comprises of the DNS servers. Are you prepared?
Yesterday, foxnews published an interesting news with regards to Cyber Security. As far as security is concerned, we protect our computers, servers and everything else, but we tend to forget about our very personal item – the smartphone. As a saying goes, we are only as strong as our weakest link. Continue reading
Wi-Fi is something that we are all so used to, something perhaps we are all rely on a lot. Many of us will assume that as long as a legitimate website is displayed, we are actually safe online. Is that true? Of course not! Continue reading
Exactly one week ago, the world commemorated the annual World Password Day. Well, passwords these days are the only thing between a hacker or intruder to our beloved data. In lieu of the recent saga of the heart-bleed bug, it is perhaps the right time to look at this again. Continue reading