Cheng Lai Ki is a Cyber Operations Consultant in Horangi’s headquarters in Singapore. Equipped with advanced degrees in Criminology, Intelligence, and International Security, he brings with him over eight continuous years working and researching in the security field. He was a former military officer from the armed forces, where he was an instructor specializing in strategy and operational tactics. Professionally and academically published within the field of cyber security in Europe and Asia, Cheng Lai Ki brings a unique cross-industry and interdisciplinary perspective towards cyber security. He is actively involved in Horangi’s intelligence, security management and incident response operations with clients in the APAC region.
In an increasingly hyper-connected Smart City world and the explosion of mobile devices, cyber threats will continue to evolve in scale and forms. How does cybersecurity play a part and how do organizations best leverage the available solutions today?
On May 23, 2019, Horangi joined Cloudvela and Maddox Technologies to co-host the How to Survive and Thrive in the World of Cybersecurity workshop.
The availability and security of your web server is the difference between a loyal customer and one who will never use your services again — or worse, spread the bad word about your business. Since almost all the Internet services available are served from web servers, they are prime targets for cyber attacks. Just last week, North American servers of
Cyber security has often been regarded as a technical career, given its predecessor origin of Information Technology (IT) Security and relevance to computers. With our growing dependence on technology, the cyber security sector is hard-pressed to be agile and adaptive to address increasingly sophisticated threats ranging from tech-savvy criminals to nation-state hackers. This hard-press for more solutions has revealed that
When we talk about espionage, most thoughts would be of spies from old cold war flicks, infiltrating top secret government facilities to retrieve sensitive information capable of gaining an edge over each other. These traditional espionage techniques still exist and are employed all state intelligence agencies.
WatchDogs 2, Source: http://static.gosunoob.com/img/1/2016/11/watch-dogs-2-coop-multiplayer.jpg Starcraft 2, Clash of Clans, XCOM 2, WatchDogs 2, and Outlast 2. These are but some of the many games widely played across the world, some of which have even been featured as e-Sports. With their increasingly immersive gameplay, a well designed “Video Game” can keep players occupied for hours and generate millions of revenue from
November ended a relatively quiet month with a major security bug in macOS High Sierra. However, there has still been a series of developments and leaks that we at Horangi feel you should be aware of as the year of 2017 comes to a close. Date: November 28, 2017 Image Source: https://cdn.macrumors.com/article-new/2016/08/012-macos-sierra-970-80-800x449.jpg?retina MacOS High Sierra Credential Validation Logic Error (CVE-2017–13872)first
Image Source: http://arinos.in/blog/wp-content/uploads/2017/02/Arinos-Blog-Post-24_02_17.jpg ; Accessed Nov 14, 2017. When discussing enterprise cybersecurity, business owners are often flooded by technical assessments of how vulnerable they are to attack, and their increased risks in today’s digital marketspace. If the recent slew of ransomware attacks has taught us anything, it is that no company is immune or totally protected from cyber-attacks. Mainstream stories