3 Pemimpin Dr, #06-04 (07), Singapore 576147
+65 8839 6772

Category: Cyber Security

A different perspective on Cyber Security Wellness for a group of working professionals

Exciting time in Aug 2018 sharing mindset and knowledge on Cyber Security Wellness with a group of working professionals from all walks of life. Who doesn’t need protection from the dark side? Happy Faces tell it all.

Cyber Security Training starts from awareness and awareness can be trained along with common sense

Completed massive trainings for 3 groups of young adult learners in Aug-Sep 2018 period. As technology becomes increasingly pervasive, it is imperative to raise the awareness and adoption of holistic cyber security among users of the internet. We focus on Cyber Security Awareness by exploring ways to help users protect themselves online. Today, there are…
Read more

Are we in time to train enough Ethical Cyber Security professionals?

Completed training another group of Cyber Security professionals in Aug 2018 and it keeps me thinking whether we have trained enough good defenders for the market. As we speak, global cyber breaches are happening. Are we ready? Are we in time? Do we have what it takes for the future? What about defending against AI-assisted…
Read more

Knowledge sharing and exchange with an interesting group of enthusiastic youngsters on the latest knowledge on data and information protection

The signals are evident that mobile threats are real. Even end-users must start to familiarize themselves with common mobile threat facing them on a day-to-day basis. With this awareness in place, we started an exploratory journey in using a wide variety of defense strategies to protect our devices and systems. “Cyber Gardians of the Galaxy…. “, so they say.

We have come a long way from the first computer to today’s technology in a short time! Time flies!

Precomputers and early computers (before approx. 1946): Abacus, slide rule, mechanical calculator, Punch Card Tabulating Machine and Sorter. First-generation computers (1946-1957): Big and powered by vacuum tubes, used lots of electricity and generated too much heat. #ENIAC and #UNIVAC Second-generation computers (1958-1963): Used transistors and then Computers become smaller, more powerful, cheaper, more energy-efficient, and…
Read more

Staying Safe in a Digital World starts from Computer Security Literacy

I am glad I’ve done my part to inspire yet another batch of young adults in Staying Safe in a Digital World 🙂 “If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology.” – Bruce Schneier, IT Security Expert

A first step into Data Security Literacy for the next generation of working class completed

“Getting information off the Internet is like taking a drink from a firehose.” – Mitchell Kapor “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know…
Read more

How standing and facing your reflection in the mirror can teach you to really look at your system and your pre-emptive actions. #White-hackers

Hands-on white-hacking computer security lessons successfully completed in 3 months again – that’s great! Great minds take a lot of self-reflections and I believe the best way to do this is: 1. Do it daily. Do it consistently. 2. Take a personal time to do it. 3. Reverse psychology helps. 4. Do it with your…
Read more

The Future of Cyber Forensics + Cyber Security Combined

Cyber Forensics may quite a new area to many IT professionals, but Cyber a.k.a IT is not new, neither is Forensics – both are well established practices. In a computer system, Forensic Investigation (F.I) is a practice to establishing the evidence and facts to be presented in court. It may involve in complex web and…
Read more

Conducted a crash course on the Professionalism in Cyber Forensics and Security

Exchanging knowledge and appreciation of the advanced theoretical and practical topics in cyber security that many security professionals have little experience with yet but are increasingly important aspects of modern computer security. Some discussed topics include: Steganography and steganalysis, classical and quantum cryptography, design principles that underpin modern malware, design and the threat models for…
Read more