Cyber Threats

The Cost of Cyber Attacks to Businesses

With the advent of digitization in the business world, companies will undoubtedly be a victim of a cyber attack at some point in their lifespan. Often than not, loopholes and gaps in weak cyber security networks allow perpetrators to extract sensitive or proprietary data for various malicious endeavors. Furthermore, a cyber attack can have rippling effects leading to more, albeit

QuanHeng LimJun 24, 2019

Explore:

Featured List

Release Notes

Code Scanner Now Detects Exposed Secrets — Storyfier July 2019 Release Notes

Samantha CruzAug 14, 2019
Cyber Strategy

As Third Party API Usage Grows, So Do API Data Breaches

Paul HadjyJul 26, 2019
Commentary

Hong Kong's Alarming Cybersecurity Crisis

Bryan CheungJun 20, 2019
Release Notes

Release Notes: May Updates

Samantha CruzJun 07, 2019
Crypto Security

Automated Audits: Ethereum Smart Contract Scanner

Chad LynchFeb 15, 2019
Commentary

Cybersecurity in the Financial Services Industry

Joshua KowNov 09, 2018
People Security

Addressing the Skills Gap: Bring in the non-technical side of cyber security.

Cheng Lai KiNov 02, 2018
Cyber Threats

You’ve been hit with ransomware. These are the steps to recovery.

Van NgoOct 05, 2018

Physical Paths to Digital Destruction

Benjamin HuberSep 28, 2018

Money FM Podcast Feature! We were on the Radio!

Lance ChuaSep 27, 2018

Subscribe to the Horangi Newsletter.

Hear from our Horangi tech experts as we go deep into up-and-coming cyber threats, new solutions, and talk about the future of cybersecurity.

Search

Latest Stories:

All Categories

Cyber Strategy

Is Penetration Testing Sufficient For A Security Audit?

QuanHeng LimAug 16, 2019
Release Notes

Code Scanner Now Detects Exposed Secrets — Storyfier July 2019 Release Notes

Samantha CruzAug 14, 2019
Cyber Strategy

How Much Does A Penetration Test Cost?

Benjamin HuberAug 08, 2019
Cyber Strategy

An Introduction To Pentesting Cloud Computing Environments

Bo Si ChuaAug 02, 2019
Events

Cybersecurity Workshop At The Lifelong Learning Institute

Cheng Lai KiAug 02, 2019
Cyber Strategy

Android App Penetration Testing Made Easy

Johnson ThiangJul 30, 2019
Cyber Strategy

As Third Party API Usage Grows, So Do API Data Breaches

Paul HadjyJul 26, 2019
Release Notes

Storyfier Now Integrated With Slack — Release Notes: June 2019

Samantha CruzJul 09, 2019

Everything You Need To Know About Web Server Pentesting

Cheng Lai KiJul 05, 2019
Cyber Threats

The Cost of Cyber Attacks to Businesses

QuanHeng LimJun 24, 2019