Vince ChewNavigating the third-party risk management (TPRM) LandscapeThis article talks about the evolving challenges and strategies in third-party risk management, spotlighting the impact of IoT…Feb 23Feb 23
Vince ChewThe State of Security Remediation 2024Analysing the report from Cloud Security AllianceFeb 23Feb 23
Vince Chew2024 State of Application Security ReportDiscover how to fortify your apps in 2024 with cutting-edge security insights. Stay ahead of threats & safeguard your digital assets.Feb 22Feb 22
Vince ChewNavigating Insider Threats: A Pragmatic Approach to Data SecurityExplore insider threat defense with a fresh approach: sensitivity, access, & activity monitoring to safeguard data effectively.Feb 22Feb 22
Vince ChewThe Evolution of Communication Between CISOs and Boards: A Comprehensive AnalysisExplore the shift in CISO-board communication over 5 years, highlighting proactive engagement, evolving cyber threats, and strategic risk…Feb 13Feb 13
Vince ChewPolitics is no exception in a world where technology increasingly intersects with all aspects of…Exploring AI’s transformative role in the Pakistani elections: How PTI’s AI-generated campaigns led to a surprising victory & reshaped…Feb 13Feb 13
Vince ChewWhen Your Toothbrush Strikes Back: A Glimpse into IoT’s Potential Cyber PerilsUnderstanding vulnerabilities & safeguarding against cyber threats in the ever-growing world of smart devices.Feb 10Feb 10
Vince ChewWhat Log4J and Ivanti Teach Us About the Hidden Dangers of Third-Party RiskExplore how the Log4J and Ivanti incidents highlight the critical importance of managing third-party risks.Jan 13Jan 13
Vince ChewHow AI is Revolutionizing CybercrimeExplore AI’s dark side in cybercrime: hacking ease, deepfakes, and law enforcement challenges. A must-read on tech’s double-edged sword.Jan 12Jan 12