Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
…
continue reading
1
S04.E1 - Crowdstrike - the global blue screen
42:10
42:10
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
42:10
Machine's turn up with blue screen all over the world, the cause seems to be a faulty update affecting Crowdstrike. Whats it about, whats going on, and a special segment on responding to your senior management or Board on the matterKirjoittanut SecurityLah
…
continue reading
1
S03E12. The year wrap up and emerging threats for 2024
1:12:06
1:12:06
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
1:12:06
team SecurityLah ends the year with a wrap up on the top 10 emerging threats for 2024. Lots of laughs and serious talk on what's up ahead!Kirjoittanut SecurityLah
…
continue reading
1
S03E11. Cyber Security Month Special - Security Awareness
51:39
51:39
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
51:39
Team Securitylah explores the challenge of Cyber Security awareness and how organizations (using Malaysia as an example) can better adopt and implement awareness sessions!Kirjoittanut SecurityLah
…
continue reading
1
S03E10: ChatGPT, Generative AI and Security
40:10
40:10
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
40:10
AI is all the buzz right now. Using ChatGPT for daily life and work is slowly becoming a norm. Apps embedding AI is the VC's darling. Is there any security risks associated to ChatGPT use? Team #securitylah explores!Kirjoittanut SecurityLah
…
continue reading
1
S03E09. FMT interviews SecurityLAH
52:20
52:20
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
52:20
Recently, SecurityLAH was interviewed by Free Malaysia Today on matters pertaining to Cyber Security and Malaysia. The hosts felt that while the article is out, it is only proper that we have a discussion around the questions, to give our listeners a full context of what the answers were.Kirjoittanut SecurityLah
…
continue reading
1
S03E08. ISO 27000 Series - Document Intro, Clause 1 - 3
17:48
17:48
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
17:48
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. In this episode, the team looks into the document details, from the front page up to Clause 3.Kirjoittanut SecurityLah
…
continue reading
1
S03E07. ISO 27000 Series - Mapping ISO 27001:2013 and ISO27001:2022
52:20
52:20
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
52:20
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. In this episode, the team looks into the differences between the older version and the current version, with discussion on what needs to be done when moving to the new standar…
…
continue reading
1
S03E06. Changes to Singpass
25:20
25:20
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
25:20
Singpass, the national digital ID for Singapore has recently made some changes to it's operations and terms of use. In this episode, team #securitylah reviews the changes to see what is the impact to the average Singaporeans and its citizens.Kirjoittanut SecurityLah
…
continue reading
1
S03E05. CyberSecurity in Sarawak?
25:12
25:12
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
25:12
Team SecurityLah is joined by Dan from SAINS and Awang from MASA to talk about cybersecurity and Sarawak. What do they have in store?Kirjoittanut SecurityLah
…
continue reading
1
S3E04. ISO Series - So you're ready for an ISO Audit (or are you) ?
57:24
57:24
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
57:24
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. In this episode, team #SecurityLah looks into the aspect of audit readiness and getting to the moment of having the ISO certification cert in your hands.…
…
continue reading
1
S3E03. ISO Series - Reading the ISO standard
43:19
43:19
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
43:19
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. In this episode, team #securityLah explains the standard structure and how one "reads" the standard.Kirjoittanut SecurityLah
…
continue reading
1
S3E02. ISO Series - Primer to the ISO 27000 series
38:44
38:44
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
38:44
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. We've looked at what standards and ISO is, and now we go into the 27k series. Team looks at the progression of the 27k series, the 7799 series and how the standards have evolv…
…
continue reading
1
S3E01. ISO Series - Of International Standards Ep 1/12
31:00
31:00
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
31:00
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. In this introductory episode, the team introduces the concept of international standards and the parties involved in making this global initiative happen.…
…
continue reading
1
S2E17: AirAsia (Capital A) breach
29:59
29:59
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
29:59
Just about a month ago, AirAsia had a data breach. The breach was announced by the ransomware group Daixin. This episode looks into the breach that had happened with team SecurityLah tearing into the details!Kirjoittanut SecurityLah
…
continue reading
We're coming to year end, with Christmas around the corner. Here are the hosts with special greetings to all of you!Kirjoittanut SecurityLah
…
continue reading
1
S2E15 - Indonesia's PT Telkom & PLN breach
19:46
19:46
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
19:46
Pt Telkom and PLN in Indonesia was breached. What happened? Team SecurityLah dives into this recent incident.Kirjoittanut SecurityLah
…
continue reading
We use API's almost every day, every.minute and it a hidden aspect of our technology use. API is fast becoming a threat vector and needs to be looked at. In this episode, Sku and Doc looks into Top 5 issues plaguing API Security.Kirjoittanut SecurityLah
…
continue reading
1
S2E13: iPay88 breach and notification - Part 2/2
25:39
25:39
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
25:39
This is the final part to the 2 part series of the iPa88 breach and notification.Kirjoittanut SecurityLah
…
continue reading
1
S2E12: iPay88 breach and notification - Part 1/2
24:42
24:42
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
24:42
Recently, a Mal;aysian payment gateway named iPay88 released a press release stating that they have been breached. Team #securitylah breaks down the press release to make sense of what happened.Kirjoittanut SecurityLah
…
continue reading
Doc came up with a new cyber security plan that, according to him, will revolutionise the industry. What is it?Kirjoittanut SecurityLah
…
continue reading
1
S2E11: Why do breaches happen?
37:10
37:10
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
37:10
In this episode, team SecurityLah talks about data breaches and why it happens. Sky gives his top 5 reasons and Doc tears it apart.Kirjoittanut SecurityLah
…
continue reading
1
S2E10: NSO Pegasus and Thailand
25:25
25:25
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
25:25
NSO's Pegasus (a commercial malware/spyware) has been hitting the news for sometime. Team #securitylah looks at the genesis of Pegasus/NSO, what has it been and whats happening with it in Thailand.Kirjoittanut SecurityLah
…
continue reading
CWE or the Common Weakness Enumeration by MITRE is a catalog of identified weaknesses that should be looked at and addressed. In this episode, Doc goes into this particular weakness and shares how most organizations miss this and how it affects security for the organization.Kirjoittanut SecurityLah
…
continue reading
1
S2E08: About CISO, and IT Security Part 2/2
23:32
23:32
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
23:32
Team SecurityLAH continues the discussion on the appointment of CISO for organizations due to regulatory and environmental requirements, and at the same time tearing apart the formation of IT Security in organizations.Kirjoittanut SecurityLah
…
continue reading
1
S2E07. About CISO… Part 1/2
24:36
24:36
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
24:36
“I see, I sow”.. said a podcaster once about CISO position. It’s now a regulatory requirements for some industries to have CISO (Chief Information Security Officer). Team SecurityLAH reviews this position in greater details, but also looks at the evolution of how IT Security from IT itself, in a holistic view.…
…
continue reading
1
S2E06. Proposed SG CyberSecurity Act amendments
14:08
14:08
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
14:08
Singapore is seen to lead the Asian region in technology. This also includes having updated legal and regulatory framework to support this growth. Singapore has made proposals, through CSA , to make changes and keep their CyberSecurity laws updated. What are the proposed changes? Tune in and find out!…
…
continue reading
1
S2E05. International Committee of Red Cross (ICRC) hacked
32:09
32:09
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
32:09
Cyber penetration is now fast becoming a common occurrence. But where do we draw the line? In this episode, we review a recent incident involving the International Committee of Red Cross, whom had informed the world that they have been hacked. Data was stolen, internal networks were compromised. What's the impact? Whose affected? What's next?…
…
continue reading
1
S2E04. Russia/Ukraine - War on the Cyber front
46:36
46:36
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
46:36
Russia has declared military operations against Ukraine, declaring both Donetsk and Luhansk independent. It’s no longer a war of words, but physical/kinetic and cyber war at large, out in the open. SecurityLah looks into the geopolitics aspect of this war, analyzing past history and the current standing of the situation, beyond just war but also ot…
…
continue reading
1
S2E03. OCBC Singapore phishing attack (Part 2/2)
30:33
30:33
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
30:33
This is the continuation and final episode of the OCBC phishing incident. The team picks up from where it left off in the last episode, with Prof joining in to give her views on the matter.Kirjoittanut SecurityLah
…
continue reading
1
S2E02: OCBC Singapore phishing attack (Part 1/2)
32:44
32:44
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
32:44
Over the year end of 2021, a massive wave of phishing attack targeting customers of OCBC Singapore was executed. We got heads up from one of our listeners who were kind enough to give us some juicy bits about this incident as we deep dive into the incident. This is the first part of the 2 part series on the OCBC phishing scam.…
…
continue reading
1
S2E01. Trends on Security - 2022
32:36
32:36
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
32:36
Welcome to Season 2 of SecurityLAH! In this opening episode, we look at trends that is upcoming, some already here and some destined to dominate the way we look at NCIS (Network. Cyber and Information Security).Kirjoittanut SecurityLah
…
continue reading
Team SecurityLAH would like to wish all of our listeners a very Merry Christmas and a Happy New Year! The team will be taking a break, practice our vocal chords a bit, maybe laze at a beach somewhere for a while since we haveKirjoittanut SecurityLah
…
continue reading
1
Ep 35. Risk vs Vulnerabilities
29:07
29:07
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
29:07
In a casual chat, the SecurityLah hosts had an internal discussion about security stuff, besides talking about topics for the podcast. This is one of those discussion, that SecurityLah felt should go to a wider audience than just the hosts itself. The team looks at risk management, specifically when dealing with vulnerability management.…
…
continue reading
1
Ep 34. National Bank of Pakistan hacked
21:34
21:34
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
21:34
We were recently alerted to a report that National Bank of Pakistan may have experienced a cyber attack. Client facing banking infrastructure was seen to be down, causing panic to its customers. Our resident Securitylah financial expert takes a stab on the matter, hoping to give some sense of clarity into the incident.…
…
continue reading
1
Ep 33. China's new data privacy law
23:08
23:08
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
23:08
China recently published their laws related to data secrecy and privacy. Team SecurityLah looks through some salient points on what the law says and how it affects China, its people and the global as a wholeKirjoittanut SecurityLah
…
continue reading
1
Ep 32. Indonesian Intelligence Agency compromised
34:19
34:19
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
34:19
In a recent report by one of the CTI providers, it was identified that a few government agencies of Indonesia was compromised by a threat actor. In this episode, the team looks at the claims of the compromise and whether its true or just rumours.Kirjoittanut SecurityLah
…
continue reading
1
Ep 31. Thai tourist visa data leak
23:52
23:52
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
23:52
A site, containing visa information to Thailand was left open and discovered by a researcher. What happened? How much of data was potentially left open? What's the impact of that incident? Answers to all those questions in this episode of SecurityLah!Kirjoittanut SecurityLah
…
continue reading
1
Ep 30. Indonesian COVID-19 data leak
14:59
14:59
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
14:59
Recently, there were reports of data leak affecting the COVID-19 contact tracing app in Indonesia. Details of users and its usage were made available, and the unfortunate victim that was made as an example was non-other that the Prime Minister himself!Kirjoittanut SecurityLah
…
continue reading
1
Ep 29. APT41 - Double Dragon
25:53
25:53
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
25:53
We explore the activities of APT41 aka Double Dragon which focuses its threat activites around South East Asia, attacking telecommunications, infrastructure and government agencies.Kirjoittanut SecurityLah
…
continue reading
1
Ep 28. myIdentity, JPN/LHDN data leak
25:26
25:26
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
25:26
A leak was found mentioning data siphoned off using myIdentity interface, originating from JPN and was done through LHDN. Team SecurityLah dissects this incident into greater details, looking at how it could have happened, and nuggets of wisdom for blue team on detecting such attacks.Kirjoittanut SecurityLah
…
continue reading
1
Ep 27. Are Cryptocurrencies secure?
31:09
31:09
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
31:09
One of the question we get from a lot of people around us, including our listeners is this cryptocurrency. Is it secure, and should someone invest on it? Before investing, what does a person need to know and how does he/she protect their digital assets?Kirjoittanut SecurityLah
…
continue reading
1
Ep 26. Of Apple CSAM, Samsung Kill Switch and Device Ownership
27:10
27:10
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
27:10
As consumers, we own a lot of smart devices. Technically they're not that smart, but you get the drift. We look at the interesting relationship between the consumer, the device and the manufacturer and the unique relationship one has with the other. Security will always be the forefront, hence we analyse how security plays out on this context.…
…
continue reading
1
Ep 25. Does cybersecurity tools/controls make your organization secure?
17:39
17:39
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
17:39
This is a special episode where we make the hosts into 2 groups, and pit these groups against each other based on a topic given. Cat is the moderator. Whole load of fun, with some interesting aha moments!Kirjoittanut SecurityLah
…
continue reading
1
Ep 24. Single Vendor aka Supply Chain attacks
17:37
17:37
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
17:37
SuecurityLah team finds a disturbing trend. A single attack/hack could affect multiple organizations. In this episode, we dive into the most talked-about attacks which originate from single vendor/source, which for some is known as supply-chain attack.Kirjoittanut SecurityLah
…
continue reading
1
Ep 23. Hacking vs Scraping
25:19
25:19
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
25:19
The recent buzz about attacks on personal data. Some say it's not a hack, but just scraping. What's the difference? Why does it matter?Kirjoittanut SecurityLah
…
continue reading
1
Ep 22. Ransomware - what's happening?
38:09
38:09
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
38:09
Open any international news portal and ransomware dominates the headlines. In this episode, the team examines ransomware and how it affects organizations and even individuals globally.Kirjoittanut SecurityLah
…
continue reading
1
Ep 21. Interpol Cyber Security report on ASEAN (2020)
33:27
33:27
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
33:27
The SecurityLAH team reviews the Interpol Cyber Security report focused on the ASEAN region, putting some rationale into the data provided. Some insights into the type attacks and why.Kirjoittanut SecurityLah
…
continue reading
1
Ep 20. Degree vs Certification - which path to take?
34:08
34:08
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
34:08
The question that often runs on everyone's mind. Which educational path should one take? Increase skills and ability through professional training, or pursue academic achievements through post degree programs?Kirjoittanut SecurityLah
…
continue reading
1
Ep 19. ePay breach - What happened? (MY)
33:04
33:04
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
33:04
The Edge Market reported that ePay, a product of GHL may have experienced a breach. The hosts at SecurityLah deep dive into this issue, looking at all of the publicly available data to get into the meat of the matter, or the bits in the cyber, so to say...Kirjoittanut SecurityLah
…
continue reading
1
Ep 18. Are Passwords still relevant?
18:41
18:41
Toista myöhemmin
Toista myöhemmin
Listat
Tykkää
Tykätty
18:41
The abomination called passwords become centerstage discussion in this episode. The bane of everyone's existence, passwords, while becoming the reality of technology and computing, is fast becoming an issue. Data leaks, breaches makes it difficult for an average user to use it effectively. We discuss at length about passwords and what are the alter…
…
continue reading