Spy Car: Hacked Vehicles and Potential Internet of Things Regulation

The terrifying remote hack of a Jeep on the highway, as reported by Andy Greenberg in Wiredmagazine , seemingly validates the pervasive, yet vague, fears that many consumers have about the digitalization of our everyday lives. Charlie Miller and Chris Valasek’s demonstration of their ability to control the car’s motor management system, remotely cut the […]

Continue Reading

8 Security Essentials for Managing Business Operations

   Date : 7 Sep 2015 Organisation : (ISC)2 Writer : Chuan-Wei Hoo   According to the 2015 (ISC)² Global Information Security Workforce Study, 62 percent of nearly 14,000 respondents believe that their organizations have too few information security professionals. Signs of strain within security operations due to the workforce shortage are materializing while companies […]

Continue Reading

Palo Alto Networks and AirWatch Mobile Security Alliance

In an earlier blog post I mentioned that the challenge for securing mobile devices has been formidable for many organizations. The limitations that arise out of classical approaches and assumptions towards security have led to many dead ends in the era of BYOD. By working with AirWatch by VMware, we have developed a number of […]

Continue Reading
%d bloggers like this: