Author:
Isaiah Chua

Isaiah Chua is a Content Marketing Manager at Horangi who loves talking about technology, cybersecurity, and content marketing. He's an avid reader who can't get by a day without good music and gallons of coffee.
Cybersecurity Risks and Business Context
After a brief hiatus, we are back with Season 3 of the Ask A CISO podcast. There are quite a few things we are doing differently this season (details below), but first, let's welcome our first guest for the new season: Fausto Lendeborg, Co-Founder and Chief Customer Officer of Secberus, and learn more about his start in cybersecurity, DDoS attacks, dealing with alert fatigue, and understanding what IaC, SaC, and PaC are.

ChatGPT: A Boon Or Bane for Cybersecurity?
Unless you've been living under a rock, you'd indeed have read or heard of ChatGPT by now. Everyone's talking about how this new Artificial Intelligence (AI) bot can help in almost every aspect of life, from cooking recipes to providing code for a startup! What about cybersecurity? In this article, we look at what opportunities and threats ChatGPT presents in our field of work.

What is the Zero Trust Model? Is it the same as the Privilege of Least Privilege?
The Principle of Least Privilege (PoLP) is a key tenet of the Zero Trust security model, but are they the same? How does PoLP fit into the Zero Trust model, and how can you implement PoLP as part of your plan to implement Zero Trust for your organization? We answer these questions for you.

The Cybersecurity Landscape in Hong Kong
Singapore and Hong Kong were acknowledged as having rather similar economies at one time, with the two countries going head-to-head in many industries, especially financial services and shipping. How different or similar is the cybersecurity landscape in Hong Kong then? Are there similarities or significant differences from Singapore's?

What Is PCI DSS 4.0 And How To Make Your Compliance Journey Easier?
Time is of the essence when you have just about two years to comply with the new PCI DSS 4.0 standard by 21 March 2024. Whether you are starting from scratch or updating your compliance from the current PCI DSS v3.2.1, read on to find out how your organization can use Warden's Compliance Automation to comply with PCI DSS v4.0 faster and with less pain.

Cybersecurity Awareness for Small Businesses
4 Cybersecurity Statistics You Should Be Aware of Today And 4 Things You Can Do Today To Minimize The Associated Risks

5 Quick Actions You Can Do Now to Improve Your Third-Party Security
Third-party vendor risk management is a challenging and critical area for companies of any size or industry, given how much organizations rely on third-party vendors for the processing of data. These 5 quick actions serve as an initial guide for you to improve your vendor risk management swiftly.

Killware: Malware That's Lethal
Ransomware incidents are headlining news and trade publications with increasing frequency so you’ll be familiar with it, but have you heard of killware?

4 Ways To Protect Your Organization From Increasing Insider Threats And Ransomware
In its 2021 Ransomware Study, IDC reported that approximately 37% of 791 global organizations surveyed were victims of some form of a ransomware attack in 2021. That is already unsettling, but here’s the other thing: ransomware attacks are also becoming increasingly sophisticated.

Real Life Examples of Web Vulnerabilities (OWASP Top 10)
Knowing the common web vulnerabilities is great, but specific examples help demonstrate the relevance of these cybersecurity issues. Let’s take the approach of following the OWASP Top 10 list.

Log4j2 Vulnerability: Horangi Is Here To Help With New And Updated Warden Rules
Automate Log4j2 Vulnerability Checks and Reduce Chances of Log4j2 Exploits with New and Updated Rules on Warden While You Apply Patches and Install Updates

Starting On Your ISO 27001 Certification Journey, And A Protip On Getting Certified! (Ask A CISO Ep. 10)
Ask A CISO host Mark Fuentes sits down with Manggala Eka Adideswar (Adi), Senior Head of Cyber Operations, Indonesia, to talk about ISO 27001, what it is, and the misconceptions surrounding achieving certification. They even include a protip for organizations looking to start on the certification journey!

The Current State Of Ransomware in APAC
With ransomware attacks on the rise, it's no longer IF you experience a ransomware attack, it's WHEN. How can you protect your organization from falling victim to ransomware? Listen as Mark Fuentes (Horangi) and Nathan Reid (Blackpanda) talk about some areas you should first focus on and share best practices you can quickly adopt to safeguard your data.

Horangi Named A Partner For the Cyber Security Agency of Singapore’s New SG Cyber Safe Partnership Programme
Horangi will offer products and services suitable for SMEs, and co-develop content and outreach programs with the Cyber Security Agency of Singapore (CSA) to raise awareness levels of cybersecurity and drive the adoption of good cybersecurity practices.

Phishing and Scamming Techniques for Cryptocurrencies
Cryptocurrency crimes have been on the rise as barriers to entry for owning cryptocurrency fall. Educate yourself about their phishing and scamming techniques.
