Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
…
continue reading
1
S04.E1 - Crowdstrike - the global blue screen
42:10
42:10
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
42:10
Machine's turn up with blue screen all over the world, the cause seems to be a faulty update affecting Crowdstrike. Whats it about, whats going on, and a special segment on responding to your senior management or Board on the matterVon SecurityLah
…
continue reading
1
S03E12. The year wrap up and emerging threats for 2024
1:12:06
1:12:06
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
1:12:06
team SecurityLah ends the year with a wrap up on the top 10 emerging threats for 2024. Lots of laughs and serious talk on what's up ahead!Von SecurityLah
…
continue reading
1
S03E11. Cyber Security Month Special - Security Awareness
51:39
51:39
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
51:39
Team Securitylah explores the challenge of Cyber Security awareness and how organizations (using Malaysia as an example) can better adopt and implement awareness sessions!Von SecurityLah
…
continue reading
1
S03E10: ChatGPT, Generative AI and Security
40:10
40:10
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
40:10
AI is all the buzz right now. Using ChatGPT for daily life and work is slowly becoming a norm. Apps embedding AI is the VC's darling. Is there any security risks associated to ChatGPT use? Team #securitylah explores!Von SecurityLah
…
continue reading
1
S03E09. FMT interviews SecurityLAH
52:20
52:20
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
52:20
Recently, SecurityLAH was interviewed by Free Malaysia Today on matters pertaining to Cyber Security and Malaysia. The hosts felt that while the article is out, it is only proper that we have a discussion around the questions, to give our listeners a full context of what the answers were.Von SecurityLah
…
continue reading
1
S03E08. ISO 27000 Series - Document Intro, Clause 1 - 3
17:48
17:48
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
17:48
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. In this episode, the team looks into the document details, from the front page up to Clause 3.Von SecurityLah
…
continue reading
1
S03E07. ISO 27000 Series - Mapping ISO 27001:2013 and ISO27001:2022
52:20
52:20
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
52:20
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. In this episode, the team looks into the differences between the older version and the current version, with discussion on what needs to be done when moving to the new standar…
…
continue reading
1
S03E06. Changes to Singpass
25:20
25:20
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
25:20
Singpass, the national digital ID for Singapore has recently made some changes to it's operations and terms of use. In this episode, team #securitylah reviews the changes to see what is the impact to the average Singaporeans and its citizens.Von SecurityLah
…
continue reading
1
S03E05. CyberSecurity in Sarawak?
25:12
25:12
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
25:12
Team SecurityLah is joined by Dan from SAINS and Awang from MASA to talk about cybersecurity and Sarawak. What do they have in store?Von SecurityLah
…
continue reading
1
S3E04. ISO Series - So you're ready for an ISO Audit (or are you) ?
57:24
57:24
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
57:24
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. In this episode, team #SecurityLah looks into the aspect of audit readiness and getting to the moment of having the ISO certification cert in your hands.…
…
continue reading
1
S3E03. ISO Series - Reading the ISO standard
43:19
43:19
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
43:19
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. In this episode, team #securityLah explains the standard structure and how one "reads" the standard.Von SecurityLah
…
continue reading
1
S3E02. ISO Series - Primer to the ISO 27000 series
38:44
38:44
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
38:44
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. We've looked at what standards and ISO is, and now we go into the 27k series. Team looks at the progression of the 27k series, the 7799 series and how the standards have evolv…
…
continue reading
1
S3E01. ISO Series - Of International Standards Ep 1/12
31:00
31:00
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
31:00
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. In this introductory episode, the team introduces the concept of international standards and the parties involved in making this global initiative happen.…
…
continue reading
1
S2E17: AirAsia (Capital A) breach
29:59
29:59
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
29:59
Just about a month ago, AirAsia had a data breach. The breach was announced by the ransomware group Daixin. This episode looks into the breach that had happened with team SecurityLah tearing into the details!Von SecurityLah
…
continue reading
We're coming to year end, with Christmas around the corner. Here are the hosts with special greetings to all of you!Von SecurityLah
…
continue reading
1
S2E15 - Indonesia's PT Telkom & PLN breach
19:46
19:46
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
19:46
Pt Telkom and PLN in Indonesia was breached. What happened? Team SecurityLah dives into this recent incident.Von SecurityLah
…
continue reading
We use API's almost every day, every.minute and it a hidden aspect of our technology use. API is fast becoming a threat vector and needs to be looked at. In this episode, Sku and Doc looks into Top 5 issues plaguing API Security.Von SecurityLah
…
continue reading
1
S2E13: iPay88 breach and notification - Part 2/2
25:39
25:39
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
25:39
This is the final part to the 2 part series of the iPa88 breach and notification.Von SecurityLah
…
continue reading
1
S2E12: iPay88 breach and notification - Part 1/2
24:42
24:42
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
24:42
Recently, a Mal;aysian payment gateway named iPay88 released a press release stating that they have been breached. Team #securitylah breaks down the press release to make sense of what happened.Von SecurityLah
…
continue reading
Doc came up with a new cyber security plan that, according to him, will revolutionise the industry. What is it?Von SecurityLah
…
continue reading
1
S2E11: Why do breaches happen?
37:10
37:10
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
37:10
In this episode, team SecurityLah talks about data breaches and why it happens. Sky gives his top 5 reasons and Doc tears it apart.Von SecurityLah
…
continue reading
1
S2E10: NSO Pegasus and Thailand
25:25
25:25
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
25:25
NSO's Pegasus (a commercial malware/spyware) has been hitting the news for sometime. Team #securitylah looks at the genesis of Pegasus/NSO, what has it been and whats happening with it in Thailand.Von SecurityLah
…
continue reading
CWE or the Common Weakness Enumeration by MITRE is a catalog of identified weaknesses that should be looked at and addressed. In this episode, Doc goes into this particular weakness and shares how most organizations miss this and how it affects security for the organization.Von SecurityLah
…
continue reading
1
S2E08: About CISO, and IT Security Part 2/2
23:32
23:32
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
23:32
Team SecurityLAH continues the discussion on the appointment of CISO for organizations due to regulatory and environmental requirements, and at the same time tearing apart the formation of IT Security in organizations.Von SecurityLah
…
continue reading
1
S2E07. About CISO… Part 1/2
24:36
24:36
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
24:36
“I see, I sow”.. said a podcaster once about CISO position. It’s now a regulatory requirements for some industries to have CISO (Chief Information Security Officer). Team SecurityLAH reviews this position in greater details, but also looks at the evolution of how IT Security from IT itself, in a holistic view.…
…
continue reading
1
S2E06. Proposed SG CyberSecurity Act amendments
14:08
14:08
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
14:08
Singapore is seen to lead the Asian region in technology. This also includes having updated legal and regulatory framework to support this growth. Singapore has made proposals, through CSA , to make changes and keep their CyberSecurity laws updated. What are the proposed changes? Tune in and find out!…
…
continue reading
1
S2E05. International Committee of Red Cross (ICRC) hacked
32:09
32:09
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
32:09
Cyber penetration is now fast becoming a common occurrence. But where do we draw the line? In this episode, we review a recent incident involving the International Committee of Red Cross, whom had informed the world that they have been hacked. Data was stolen, internal networks were compromised. What's the impact? Whose affected? What's next?…
…
continue reading
1
S2E04. Russia/Ukraine - War on the Cyber front
46:36
46:36
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
46:36
Russia has declared military operations against Ukraine, declaring both Donetsk and Luhansk independent. It’s no longer a war of words, but physical/kinetic and cyber war at large, out in the open. SecurityLah looks into the geopolitics aspect of this war, analyzing past history and the current standing of the situation, beyond just war but also ot…
…
continue reading
1
S2E03. OCBC Singapore phishing attack (Part 2/2)
30:33
30:33
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
30:33
This is the continuation and final episode of the OCBC phishing incident. The team picks up from where it left off in the last episode, with Prof joining in to give her views on the matter.Von SecurityLah
…
continue reading
1
S2E02: OCBC Singapore phishing attack (Part 1/2)
32:44
32:44
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
32:44
Over the year end of 2021, a massive wave of phishing attack targeting customers of OCBC Singapore was executed. We got heads up from one of our listeners who were kind enough to give us some juicy bits about this incident as we deep dive into the incident. This is the first part of the 2 part series on the OCBC phishing scam.…
…
continue reading
1
S2E01. Trends on Security - 2022
32:36
32:36
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
32:36
Welcome to Season 2 of SecurityLAH! In this opening episode, we look at trends that is upcoming, some already here and some destined to dominate the way we look at NCIS (Network. Cyber and Information Security).Von SecurityLah
…
continue reading
Team SecurityLAH would like to wish all of our listeners a very Merry Christmas and a Happy New Year! The team will be taking a break, practice our vocal chords a bit, maybe laze at a beach somewhere for a while since we haveVon SecurityLah
…
continue reading
1
Ep 35. Risk vs Vulnerabilities
29:07
29:07
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
29:07
In a casual chat, the SecurityLah hosts had an internal discussion about security stuff, besides talking about topics for the podcast. This is one of those discussion, that SecurityLah felt should go to a wider audience than just the hosts itself. The team looks at risk management, specifically when dealing with vulnerability management.…
…
continue reading
1
Ep 34. National Bank of Pakistan hacked
21:34
21:34
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
21:34
We were recently alerted to a report that National Bank of Pakistan may have experienced a cyber attack. Client facing banking infrastructure was seen to be down, causing panic to its customers. Our resident Securitylah financial expert takes a stab on the matter, hoping to give some sense of clarity into the incident.…
…
continue reading
1
Ep 33. China's new data privacy law
23:08
23:08
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
23:08
China recently published their laws related to data secrecy and privacy. Team SecurityLah looks through some salient points on what the law says and how it affects China, its people and the global as a wholeVon SecurityLah
…
continue reading
1
Ep 32. Indonesian Intelligence Agency compromised
34:19
34:19
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
34:19
In a recent report by one of the CTI providers, it was identified that a few government agencies of Indonesia was compromised by a threat actor. In this episode, the team looks at the claims of the compromise and whether its true or just rumours.Von SecurityLah
…
continue reading
1
Ep 31. Thai tourist visa data leak
23:52
23:52
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
23:52
A site, containing visa information to Thailand was left open and discovered by a researcher. What happened? How much of data was potentially left open? What's the impact of that incident? Answers to all those questions in this episode of SecurityLah!Von SecurityLah
…
continue reading
1
Ep 30. Indonesian COVID-19 data leak
14:59
14:59
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
14:59
Recently, there were reports of data leak affecting the COVID-19 contact tracing app in Indonesia. Details of users and its usage were made available, and the unfortunate victim that was made as an example was non-other that the Prime Minister himself!Von SecurityLah
…
continue reading
1
Ep 29. APT41 - Double Dragon
25:53
25:53
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
25:53
We explore the activities of APT41 aka Double Dragon which focuses its threat activites around South East Asia, attacking telecommunications, infrastructure and government agencies.Von SecurityLah
…
continue reading
1
Ep 28. myIdentity, JPN/LHDN data leak
25:26
25:26
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
25:26
A leak was found mentioning data siphoned off using myIdentity interface, originating from JPN and was done through LHDN. Team SecurityLah dissects this incident into greater details, looking at how it could have happened, and nuggets of wisdom for blue team on detecting such attacks.Von SecurityLah
…
continue reading
1
Ep 27. Are Cryptocurrencies secure?
31:09
31:09
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
31:09
One of the question we get from a lot of people around us, including our listeners is this cryptocurrency. Is it secure, and should someone invest on it? Before investing, what does a person need to know and how does he/she protect their digital assets?Von SecurityLah
…
continue reading
1
Ep 26. Of Apple CSAM, Samsung Kill Switch and Device Ownership
27:10
27:10
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
27:10
As consumers, we own a lot of smart devices. Technically they're not that smart, but you get the drift. We look at the interesting relationship between the consumer, the device and the manufacturer and the unique relationship one has with the other. Security will always be the forefront, hence we analyse how security plays out on this context.…
…
continue reading
1
Ep 25. Does cybersecurity tools/controls make your organization secure?
17:39
17:39
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
17:39
This is a special episode where we make the hosts into 2 groups, and pit these groups against each other based on a topic given. Cat is the moderator. Whole load of fun, with some interesting aha moments!Von SecurityLah
…
continue reading
1
Ep 24. Single Vendor aka Supply Chain attacks
17:37
17:37
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
17:37
SuecurityLah team finds a disturbing trend. A single attack/hack could affect multiple organizations. In this episode, we dive into the most talked-about attacks which originate from single vendor/source, which for some is known as supply-chain attack.Von SecurityLah
…
continue reading
1
Ep 23. Hacking vs Scraping
25:19
25:19
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
25:19
The recent buzz about attacks on personal data. Some say it's not a hack, but just scraping. What's the difference? Why does it matter?Von SecurityLah
…
continue reading
1
Ep 22. Ransomware - what's happening?
38:09
38:09
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
38:09
Open any international news portal and ransomware dominates the headlines. In this episode, the team examines ransomware and how it affects organizations and even individuals globally.Von SecurityLah
…
continue reading
1
Ep 21. Interpol Cyber Security report on ASEAN (2020)
33:27
33:27
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
33:27
The SecurityLAH team reviews the Interpol Cyber Security report focused on the ASEAN region, putting some rationale into the data provided. Some insights into the type attacks and why.Von SecurityLah
…
continue reading
1
Ep 20. Degree vs Certification - which path to take?
34:08
34:08
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
34:08
The question that often runs on everyone's mind. Which educational path should one take? Increase skills and ability through professional training, or pursue academic achievements through post degree programs?Von SecurityLah
…
continue reading
1
Ep 19. ePay breach - What happened? (MY)
33:04
33:04
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
33:04
The Edge Market reported that ePay, a product of GHL may have experienced a breach. The hosts at SecurityLah deep dive into this issue, looking at all of the publicly available data to get into the meat of the matter, or the bits in the cyber, so to say...Von SecurityLah
…
continue reading
1
Ep 18. Are Passwords still relevant?
18:41
18:41
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
18:41
The abomination called passwords become centerstage discussion in this episode. The bane of everyone's existence, passwords, while becoming the reality of technology and computing, is fast becoming an issue. Data leaks, breaches makes it difficult for an average user to use it effectively. We discuss at length about passwords and what are the alter…
…
continue reading