Quan Heng LimThe Cost of Cyber Attacks to BusinessesWith the advent of digitization in the business world, companies will undoubtedly be a victim of a cyber attack at some point in their…Aug 30, 2019Aug 30, 2019
Quan Heng LimIs Penetration Testing Sufficient For A Security Audit?Penetration testing (‘Pentest’) is one of cybersecurity’s most well-known practices. Often referenced in popular culture, Penetration…Aug 30, 2019Aug 30, 2019
Quan Heng LimCybersecurity in the Healthcare IndustryBetween the 27th of June and the 4th of July, Singapore experienced its biggest and most serious cyberattack to date.Oct 6, 2018Oct 6, 2018
Quan Heng LiminHorangiReal Life Examples Of Web Vulnerabilities (Revised with OWASP 2017)Since the previous review of web vulnerabilities mapped to the OWASP Top 10 previously published on Apr 10, 2017, the awareness document…Jan 4, 2018Jan 4, 2018
Quan Heng LiminHorangiCyber Security — October ReviewOctober was an exciting month in cybersecurity. Among the headliners was the highly anticipated release of information regarding WIFI…Nov 3, 2017Nov 3, 2017
Quan Heng LiminHorangiSecuring Bitcoin (or just about any cryptocurrency)Interest in bitcoin has been surging in the past few years. In recent months, Ethereum, smart contracts and the ethereum virtual machine…Sep 4, 2017Sep 4, 2017
Quan Heng LiminHorangiCloud Hosts And The Shared Responsibility ModelWith hosting services on the cloud, the shared responsibility model establishes the extent of responsibility between the customer and…Jul 5, 2017Jul 5, 2017
Quan Heng LiminHorangiAbout Petya/NotPetyaPetya/NotPetya, another ransomware following close on the heels of WannaCry is also based on the EternalBlue exploit. Ukraine and Russia…Jun 28, 2017Jun 28, 2017
Quan Heng LiminHorangiPentesting Methodology 101Penetration testing is an authorized simulation of an attack on a system, network, or application to find potential vulnerabilities that…May 17, 2017May 17, 2017
Quan Heng LiminHorangiReal Life Examples Of Web VulnerabilitiesKnowing the common web vulnerabilities is great, but often it is hard to think of specific examples that appear in popular news to show the…Apr 10, 2017Apr 10, 2017