Author:
Paul Hadjy

Paul is a technology visionary working across the US, Middle East, Singapore, Korea, and New Zealand to build business in both the private and public sectors. Paul spent over 6 years at Palantir and was the Head of Information Security at Grab.
Bitdefender Completes Acquisition of Horangi Cyber Security
Transaction Expands Bitdefender Product and Services Portfolio with Cloud Infrastructure Entitlement Management, Cloud Security Posture Management and Security Consulting Services

Horangi Cyber Security joins forces with Bitdefender!
Horangi Cyber Security to be acquired by Bitdefender, a global cybersecurity leader.

Modern Security Awareness Programs and People-Centric Cybersecurity
Cybersecurity awareness training can be long and boring. With shorter attention spans and work at the back of your mind, sitting through a training session may seem like a waste of time . How should cybersecurity awareness training be conducted in this landscape? We speak to Theo Nasser, Founder, and CEO of RIght-Hand Cybersecurity, to learn about modern cybersecurity awareness training and people-centric cybersecurity.

Cryptocurrencies, DeFi Hacks & the Future of the Crypto Market
We may be experiencing a "crypto winter" now, but the technology is definitely here to stay. Pasi Koistinen, CISO of Coinhako, a Singapore-based crypto exchange, joins us this week to talk about crypto, DeFi hacks and how you as an investor can protect your crypto investments.

Web3, The Metaverse, and Cyber Risk Management
What are the unique challenges that Web3, the Metaverse, and in particular, crypto and NFTs present with regards to trust? Michael Lew, CEO of Rajah and Tann Technologies and Chairman of the Cyber Risk sub-committee of the Singapore Fintech Association, sits down with host Paul Hadjy to discuss this and how companies should approach cyber risk management.

Cybersecurity Sales and Diversity in the Industry
With so many cybersecurity tools on the market today, what can help CISOs choose which ones to purchase and implement to secure their organizations? We put this question to Alexandra Jorissen, a veteran tech sales professional who spent 10 years at Google, in this episode of the Ask A CISO podcast.

DevSecOps, AppSec, and What Is Application Security Posture Management?
Attackers will always target the weakest link on a software supply chain, as in the case with SolarWinds. How can you secure your software supply chain? On this week's Ask A CISO podcast, we go developer-first and talk about all things DevSecOps and AppSec, and find out more about Application Security Posture Management.

How Startups Can Overcome Limitations To Secure Their Business
Startups cannot afford to make the mistake of thinking of cybersecurity as an afterthought. Having a healthy, business-enabling cybersecurity posture from day one can be a daunting task given the limited budgetary and manpower resources, but not an impossible goal. How, then, can startups achieve that?

Advantages of Moving to the Cloud and Predictions on the Future of Banking
Having to sync and migrate the IT infrastructures from two different entities to the cloud is no easy task. In this episode of the podcast, find out how Ned Lowe and Singlife with Aviva succeeded in doing that and how the cloud has been a business enabler for the insurer.

S3 Bucket Permissions and IAM Audits
Data is the most valuable resource in the world and more prized than oil, The Economist declared in 2017. Today, at least 97% of organizations use data to power their business opportunities, and we are accumulating data at a rate never before seen in history. The big question then is how do we secure and ensure that we can make optimal use of all this data?

Women in Cybersecurity, and Support for Cybersecurity Entrepreneurship in Asia
More women are needed in cybersecurity, but where are the opportunities? To celebrate International Women's Day, we are honored to have Linda Schindler, Programme Head at ICE71, the region's first cybersecurity entrepreneur hub, join us on the Ask A CISO podcast.

Shocking Cybersecurity War Stories And The Lessons We Can Learn From Them
The old adage that those who don't learn from history are doomed to repeat it rings very true in cybersecurity too. The mistakes that others made serve as some of the best lessons you can learn from, and often function as reminders not to commit the same blunders.

Horangi Announces Threat Hunting Unit To Help Organizations Defend Against Ransomware And Advanced Attacks
Experienced cybersecurity consultants and certified white-hat hackers of the Unit will combine their skills with cutting-edge technologies and market-leading EDR tools to perform threat hunting and execute incident response playbooks.

The CISO Evolution: Why Today's Security Leaders Need To Combine Technical Expertise With Business Savvy
Many Security Leaders today are burned out from having to overcome challenges like the misalignment of cybersecurity programs with organizational strategy and answering the question of where cyber really lies within the organization. What can you do to get buy-in from the Board for your security programs?

The Evolution of Ransomware, How Ransomware Gangs Work, And How You Can Prevent An Attack
Greg Edwards, the CEO of CryptoStopper, walks us through the history of ransomware, what accelerated the use of ransomware by cybercriminals, how Ransomware-as-a-Service and ransomware gangs work, and how you can protect yourself and your organization from an attack.

Practical Advice For A Career In Cybersecurity
No Experience? No Problem. Dr. Gerald Auger, the co-author of Cybersecurity Career Master Plan and Host of Simply Cyber, walks us through some things you can start doing today to improve your chances of starting on or making a switch to a career in Information Security, and how employers can retain good cybersecurity staff.

A Good Cloud Security Posture Is Not Unattainable, But Within REA&H (Ask A CISO Ep. 12)
Co-Founder and CEO, Horangi, Paul Hadjy chats with Lucas Kauffman, a Security Consultant with Amazon Web Services (Singapore) about his work at AWS, cloud security, and how REA&H can help improve your cloud security posture.

Horangi and Amazon Web Services Launch Holistic Cloud Security Offering to Help Businesses Accelerate Cloud Development
The unique solution from the cloud security leaders combines best-in-class security tools such as Horangi Warden with professional services to help organizations secure, monitor, and grow through meeting regulatory compliance and implementing a resilient cloud security program that aligns with desired business outcomes and supports innovation and accelerates go-to-market.

Southeast Asia Cybersecurity Company, Horangi, Among First in Asia to Attain SOC 2 Type II Certification, Reaffirms Commitment Towards SaaS Security Standards & Delivering Secure Data Management for Cloud-First Organizations
The SOC 2 compliance framework is internationally recognized as the gold standard for security compliance for Software-as-a-Service (SaaS) companies, and reaffirms Horangi’s commitment to meeting trust services criteria in information and data security.

Horangi Partners with Huawei Cloud to Empower Organisations with Comprehensive Cloud Security, Boosting their Growth Capabilities in Asia’s Digital-first Economy
Horangi and Huawei Cloud, today announced a partnership aimed at providing cloud security solutions for organisations on the cloud platform in Asia Pacific (APAC). Founded to deliver best-in-class security on an easy-to-use cloud platform, the partnership is expected to benefit fast growing digital organisations across 10 countries in the region.
