top of page
Search


Buffer-Overflow Vulnerability Affect 41,545 Servers
Remote management tools have made many administrators’ job easier, allowing them to perform administrative tasks (e.g. reinstalling an...

Div0 Blog Editor
Aug 31, 20133 min read


Today the Lights, Tomorrow, the World.
The Internet of Things (IoT) [1] is defined as everyday objects being interconnected and networked. This includes smart-devices such as...

Div0 Blog Editor
Aug 24, 20133 min read


Evolution of Online Security Tokens & its Impact
When I received my new token from DBS I thought, “this is almost as thin as my credit card”. Today my credit card can also be my security...

Div0 Blog Editor
Dec 25, 20124 min read


A Day at GovWare 2012
GovWare was not quite the same this year ... But, the usual discussion on Advanced Persistent Threat (APT) ran its course. Not only is it...

Div0 Blog Editor
Oct 3, 20123 min read


Cyber Place
A year ago, I presented Securing the World of Avatar at SyScan Singapore. It's a lightning talk about a brief thought I had when I was...

Div0 Blog Editor
May 12, 20123 min read


How would you Classify an APT?
GovWare 2011 – Enterprise Security Track I had the privilege to be in one of the sessions conducted by SecureAge in the Enterprise...

Div0 Blog Editor
Sep 28, 20112 min read


Common Criteria — An Interview with Jussipekka Leiwo
How much do you know about Common Criteria (CC)? It is a deep-tech domain not widely taught nor explored in many courses of study in...

Div0 Blog Editor
Aug 12, 20118 min read


Defining Advanced Persistent Threat (APT)
Just mention APT in your presentation/product, people will come and listen to you. A passing remarked I received from my friend when I...

Div0 Blog Editor
Feb 19, 20111 min read
BLOG: Blog2
bottom of page