top of page
Search
Div0 Blog Editor
Aug 31, 20133 min read
Buffer-Overflow Vulnerability Affect 41,545 Servers
Remote management tools have made many administrators’ job easier, allowing them to perform administrative tasks (e.g. reinstalling an...
12 views0 comments
Div0 Blog Editor
Aug 24, 20133 min read
Today the Lights, Tomorrow, the World.
The Internet of Things (IoT) [1] is defined as everyday objects being interconnected and networked. This includes smart-devices such as...
23 views0 comments
Div0 Blog Editor
Dec 25, 20124 min read
Evolution of Online Security Tokens & its Impact
When I received my new token from DBS I thought, “this is almost as thin as my credit card”. Today my credit card can also be my security...
60 views0 comments
Div0 Blog Editor
Oct 3, 20123 min read
A Day at GovWare 2012
GovWare was not quite the same this year ... But, the usual discussion on Advanced Persistent Threat (APT) ran its course. Not only is it...
11 views0 comments
Div0 Blog Editor
May 12, 20123 min read
Cyber Place
A year ago, I presented Securing the World of Avatar at SyScan Singapore. It's a lightning talk about a brief thought I had when I was...
8 views0 comments
Div0 Blog Editor
Sep 28, 20112 min read
How would you Classify an APT?
GovWare 2011 – Enterprise Security Track I had the privilege to be in one of the sessions conducted by SecureAge in the Enterprise...
16 views0 comments
Div0 Blog Editor
Aug 12, 20118 min read
Common Criteria — An Interview with Jussipekka Leiwo
How much do you know about Common Criteria (CC)? It is a deep-tech domain not widely taught nor explored in many courses of study in...
65 views0 comments
Div0 Blog Editor
Feb 19, 20111 min read
Defining Advanced Persistent Threat (APT)
Just mention APT in your presentation/product, people will come and listen to you. A passing remarked I received from my friend when I...
5 views0 comments
BLOG: Blog2
bottom of page