Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
…
continue reading
1
S04.E1 - Crowdstrike - the global blue screen
42:10
42:10
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
42:10
Machine's turn up with blue screen all over the world, the cause seems to be a faulty update affecting Crowdstrike. Whats it about, whats going on, and a special segment on responding to your senior management or Board on the matterעל ידי SecurityLah
…
continue reading
1
S03E12. The year wrap up and emerging threats for 2024
1:12:06
1:12:06
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:12:06
team SecurityLah ends the year with a wrap up on the top 10 emerging threats for 2024. Lots of laughs and serious talk on what's up ahead!על ידי SecurityLah
…
continue reading
1
S03E11. Cyber Security Month Special - Security Awareness
51:39
51:39
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
51:39
Team Securitylah explores the challenge of Cyber Security awareness and how organizations (using Malaysia as an example) can better adopt and implement awareness sessions!על ידי SecurityLah
…
continue reading
1
S03E10: ChatGPT, Generative AI and Security
40:10
40:10
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
40:10
AI is all the buzz right now. Using ChatGPT for daily life and work is slowly becoming a norm. Apps embedding AI is the VC's darling. Is there any security risks associated to ChatGPT use? Team #securitylah explores!על ידי SecurityLah
…
continue reading
1
S03E09. FMT interviews SecurityLAH
52:20
52:20
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
52:20
Recently, SecurityLAH was interviewed by Free Malaysia Today on matters pertaining to Cyber Security and Malaysia. The hosts felt that while the article is out, it is only proper that we have a discussion around the questions, to give our listeners a full context of what the answers were.על ידי SecurityLah
…
continue reading
1
S03E08. ISO 27000 Series - Document Intro, Clause 1 - 3
17:48
17:48
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
17:48
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. In this episode, the team looks into the document details, from the front page up to Clause 3.על ידי SecurityLah
…
continue reading
1
S03E07. ISO 27000 Series - Mapping ISO 27001:2013 and ISO27001:2022
52:20
52:20
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
52:20
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. In this episode, the team looks into the differences between the older version and the current version, with discussion on what needs to be done when moving to the new standar…
…
continue reading
Singpass, the national digital ID for Singapore has recently made some changes to it's operations and terms of use. In this episode, team #securitylah reviews the changes to see what is the impact to the average Singaporeans and its citizens.על ידי SecurityLah
…
continue reading
1
S03E05. CyberSecurity in Sarawak?
25:12
25:12
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
25:12
Team SecurityLah is joined by Dan from SAINS and Awang from MASA to talk about cybersecurity and Sarawak. What do they have in store?על ידי SecurityLah
…
continue reading
1
S3E04. ISO Series - So you're ready for an ISO Audit (or are you) ?
57:24
57:24
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
57:24
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. In this episode, team #SecurityLah looks into the aspect of audit readiness and getting to the moment of having the ISO certification cert in your hands.…
…
continue reading
1
S3E03. ISO Series - Reading the ISO standard
43:19
43:19
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
43:19
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. In this episode, team #securityLah explains the standard structure and how one "reads" the standard.על ידי SecurityLah
…
continue reading
1
S3E02. ISO Series - Primer to the ISO 27000 series
38:44
38:44
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
38:44
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. We've looked at what standards and ISO is, and now we go into the 27k series. Team looks at the progression of the 27k series, the 7799 series and how the standards have evolv…
…
continue reading
1
S3E01. ISO Series - Of International Standards Ep 1/12
31:00
31:00
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
31:00
Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. In this introductory episode, the team introduces the concept of international standards and the parties involved in making this global initiative happen.…
…
continue reading
1
S2E17: AirAsia (Capital A) breach
29:59
29:59
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
29:59
Just about a month ago, AirAsia had a data breach. The breach was announced by the ransomware group Daixin. This episode looks into the breach that had happened with team SecurityLah tearing into the details!על ידי SecurityLah
…
continue reading
We're coming to year end, with Christmas around the corner. Here are the hosts with special greetings to all of you!על ידי SecurityLah
…
continue reading
1
S2E15 - Indonesia's PT Telkom & PLN breach
19:46
19:46
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
19:46
Pt Telkom and PLN in Indonesia was breached. What happened? Team SecurityLah dives into this recent incident.על ידי SecurityLah
…
continue reading
We use API's almost every day, every.minute and it a hidden aspect of our technology use. API is fast becoming a threat vector and needs to be looked at. In this episode, Sku and Doc looks into Top 5 issues plaguing API Security.על ידי SecurityLah
…
continue reading
1
S2E13: iPay88 breach and notification - Part 2/2
25:39
25:39
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
25:39
This is the final part to the 2 part series of the iPa88 breach and notification.על ידי SecurityLah
…
continue reading
1
S2E12: iPay88 breach and notification - Part 1/2
24:42
24:42
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
24:42
Recently, a Mal;aysian payment gateway named iPay88 released a press release stating that they have been breached. Team #securitylah breaks down the press release to make sense of what happened.על ידי SecurityLah
…
continue reading
1
BONUS: Doc's Cyber Security Business Plan
9:24
9:24
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
9:24
Doc came up with a new cyber security plan that, according to him, will revolutionise the industry. What is it?על ידי SecurityLah
…
continue reading
In this episode, team SecurityLah talks about data breaches and why it happens. Sky gives his top 5 reasons and Doc tears it apart.על ידי SecurityLah
…
continue reading
NSO's Pegasus (a commercial malware/spyware) has been hitting the news for sometime. Team #securitylah looks at the genesis of Pegasus/NSO, what has it been and whats happening with it in Thailand.על ידי SecurityLah
…
continue reading
CWE or the Common Weakness Enumeration by MITRE is a catalog of identified weaknesses that should be looked at and addressed. In this episode, Doc goes into this particular weakness and shares how most organizations miss this and how it affects security for the organization.על ידי SecurityLah
…
continue reading
1
S2E08: About CISO, and IT Security Part 2/2
23:32
23:32
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
23:32
Team SecurityLAH continues the discussion on the appointment of CISO for organizations due to regulatory and environmental requirements, and at the same time tearing apart the formation of IT Security in organizations.על ידי SecurityLah
…
continue reading
“I see, I sow”.. said a podcaster once about CISO position. It’s now a regulatory requirements for some industries to have CISO (Chief Information Security Officer). Team SecurityLAH reviews this position in greater details, but also looks at the evolution of how IT Security from IT itself, in a holistic view.…
…
continue reading
1
S2E06. Proposed SG CyberSecurity Act amendments
14:08
14:08
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
14:08
Singapore is seen to lead the Asian region in technology. This also includes having updated legal and regulatory framework to support this growth. Singapore has made proposals, through CSA , to make changes and keep their CyberSecurity laws updated. What are the proposed changes? Tune in and find out!…
…
continue reading
1
S2E05. International Committee of Red Cross (ICRC) hacked
32:09
32:09
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
32:09
Cyber penetration is now fast becoming a common occurrence. But where do we draw the line? In this episode, we review a recent incident involving the International Committee of Red Cross, whom had informed the world that they have been hacked. Data was stolen, internal networks were compromised. What's the impact? Whose affected? What's next?…
…
continue reading
1
S2E04. Russia/Ukraine - War on the Cyber front
46:36
46:36
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
46:36
Russia has declared military operations against Ukraine, declaring both Donetsk and Luhansk independent. It’s no longer a war of words, but physical/kinetic and cyber war at large, out in the open. SecurityLah looks into the geopolitics aspect of this war, analyzing past history and the current standing of the situation, beyond just war but also ot…
…
continue reading
1
S2E03. OCBC Singapore phishing attack (Part 2/2)
30:33
30:33
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
30:33
This is the continuation and final episode of the OCBC phishing incident. The team picks up from where it left off in the last episode, with Prof joining in to give her views on the matter.על ידי SecurityLah
…
continue reading
1
S2E02: OCBC Singapore phishing attack (Part 1/2)
32:44
32:44
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
32:44
Over the year end of 2021, a massive wave of phishing attack targeting customers of OCBC Singapore was executed. We got heads up from one of our listeners who were kind enough to give us some juicy bits about this incident as we deep dive into the incident. This is the first part of the 2 part series on the OCBC phishing scam.…
…
continue reading
1
S2E01. Trends on Security - 2022
32:36
32:36
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
32:36
Welcome to Season 2 of SecurityLAH! In this opening episode, we look at trends that is upcoming, some already here and some destined to dominate the way we look at NCIS (Network. Cyber and Information Security).על ידי SecurityLah
…
continue reading
1
Bonus Track - Christmas & New Year wishes!
4:47
4:47
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
4:47
Team SecurityLAH would like to wish all of our listeners a very Merry Christmas and a Happy New Year! The team will be taking a break, practice our vocal chords a bit, maybe laze at a beach somewhere for a while since we haveעל ידי SecurityLah
…
continue reading
In a casual chat, the SecurityLah hosts had an internal discussion about security stuff, besides talking about topics for the podcast. This is one of those discussion, that SecurityLah felt should go to a wider audience than just the hosts itself. The team looks at risk management, specifically when dealing with vulnerability management.…
…
continue reading
1
Ep 34. National Bank of Pakistan hacked
21:34
21:34
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
21:34
We were recently alerted to a report that National Bank of Pakistan may have experienced a cyber attack. Client facing banking infrastructure was seen to be down, causing panic to its customers. Our resident Securitylah financial expert takes a stab on the matter, hoping to give some sense of clarity into the incident.…
…
continue reading
1
Ep 33. China's new data privacy law
23:08
23:08
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
23:08
China recently published their laws related to data secrecy and privacy. Team SecurityLah looks through some salient points on what the law says and how it affects China, its people and the global as a wholeעל ידי SecurityLah
…
continue reading
1
Ep 32. Indonesian Intelligence Agency compromised
34:19
34:19
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
34:19
In a recent report by one of the CTI providers, it was identified that a few government agencies of Indonesia was compromised by a threat actor. In this episode, the team looks at the claims of the compromise and whether its true or just rumours.על ידי SecurityLah
…
continue reading
1
Ep 31. Thai tourist visa data leak
23:52
23:52
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
23:52
A site, containing visa information to Thailand was left open and discovered by a researcher. What happened? How much of data was potentially left open? What's the impact of that incident? Answers to all those questions in this episode of SecurityLah!על ידי SecurityLah
…
continue reading
1
Ep 30. Indonesian COVID-19 data leak
14:59
14:59
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
14:59
Recently, there were reports of data leak affecting the COVID-19 contact tracing app in Indonesia. Details of users and its usage were made available, and the unfortunate victim that was made as an example was non-other that the Prime Minister himself!על ידי SecurityLah
…
continue reading
We explore the activities of APT41 aka Double Dragon which focuses its threat activites around South East Asia, attacking telecommunications, infrastructure and government agencies.על ידי SecurityLah
…
continue reading
1
Ep 28. myIdentity, JPN/LHDN data leak
25:26
25:26
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
25:26
A leak was found mentioning data siphoned off using myIdentity interface, originating from JPN and was done through LHDN. Team SecurityLah dissects this incident into greater details, looking at how it could have happened, and nuggets of wisdom for blue team on detecting such attacks.על ידי SecurityLah
…
continue reading
1
Ep 27. Are Cryptocurrencies secure?
31:09
31:09
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
31:09
One of the question we get from a lot of people around us, including our listeners is this cryptocurrency. Is it secure, and should someone invest on it? Before investing, what does a person need to know and how does he/she protect their digital assets?על ידי SecurityLah
…
continue reading
1
Ep 26. Of Apple CSAM, Samsung Kill Switch and Device Ownership
27:10
27:10
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
27:10
As consumers, we own a lot of smart devices. Technically they're not that smart, but you get the drift. We look at the interesting relationship between the consumer, the device and the manufacturer and the unique relationship one has with the other. Security will always be the forefront, hence we analyse how security plays out on this context.…
…
continue reading
1
Ep 25. Does cybersecurity tools/controls make your organization secure?
17:39
17:39
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
17:39
This is a special episode where we make the hosts into 2 groups, and pit these groups against each other based on a topic given. Cat is the moderator. Whole load of fun, with some interesting aha moments!על ידי SecurityLah
…
continue reading
1
Ep 24. Single Vendor aka Supply Chain attacks
17:37
17:37
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
17:37
SuecurityLah team finds a disturbing trend. A single attack/hack could affect multiple organizations. In this episode, we dive into the most talked-about attacks which originate from single vendor/source, which for some is known as supply-chain attack.על ידי SecurityLah
…
continue reading
The recent buzz about attacks on personal data. Some say it's not a hack, but just scraping. What's the difference? Why does it matter?על ידי SecurityLah
…
continue reading
1
Ep 22. Ransomware - what's happening?
38:09
38:09
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
38:09
Open any international news portal and ransomware dominates the headlines. In this episode, the team examines ransomware and how it affects organizations and even individuals globally.על ידי SecurityLah
…
continue reading
1
Ep 21. Interpol Cyber Security report on ASEAN (2020)
33:27
33:27
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
33:27
The SecurityLAH team reviews the Interpol Cyber Security report focused on the ASEAN region, putting some rationale into the data provided. Some insights into the type attacks and why.על ידי SecurityLah
…
continue reading
1
Ep 20. Degree vs Certification - which path to take?
34:08
34:08
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
34:08
The question that often runs on everyone's mind. Which educational path should one take? Increase skills and ability through professional training, or pursue academic achievements through post degree programs?על ידי SecurityLah
…
continue reading
1
Ep 19. ePay breach - What happened? (MY)
33:04
33:04
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
33:04
The Edge Market reported that ePay, a product of GHL may have experienced a breach. The hosts at SecurityLah deep dive into this issue, looking at all of the publicly available data to get into the meat of the matter, or the bits in the cyber, so to say...על ידי SecurityLah
…
continue reading
1
Ep 18. Are Passwords still relevant?
18:41
18:41
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
18:41
The abomination called passwords become centerstage discussion in this episode. The bane of everyone's existence, passwords, while becoming the reality of technology and computing, is fast becoming an issue. Data leaks, breaches makes it difficult for an average user to use it effectively. We discuss at length about passwords and what are the alter…
…
continue reading