top of page
Search


Buffer-Overflow Vulnerability Affect 41,545 Servers
Remote management tools have made many administrators’ job easier, allowing them to perform administrative tasks (e.g. reinstalling an...

Div0 Blog Editor
Aug 31, 20133 min read
12 views
0 comments


Today the Lights, Tomorrow, the World.
The Internet of Things (IoT) [1] is defined as everyday objects being interconnected and networked. This includes smart-devices such as...

Div0 Blog Editor
Aug 24, 20133 min read
23 views
0 comments


Evolution of Online Security Tokens & its Impact
When I received my new token from DBS I thought, “this is almost as thin as my credit card”. Today my credit card can also be my security...

Div0 Blog Editor
Dec 25, 20124 min read
63 views
0 comments


A Day at GovWare 2012
GovWare was not quite the same this year ... But, the usual discussion on Advanced Persistent Threat (APT) ran its course. Not only is it...

Div0 Blog Editor
Oct 3, 20123 min read
11 views
0 comments


Cyber Place
A year ago, I presented Securing the World of Avatar at SyScan Singapore. It's a lightning talk about a brief thought I had when I was...

Div0 Blog Editor
May 12, 20123 min read
8 views
0 comments


How would you Classify an APT?
GovWare 2011 – Enterprise Security Track I had the privilege to be in one of the sessions conducted by SecureAge in the Enterprise...

Div0 Blog Editor
Sep 28, 20112 min read
16 views
0 comments


Common Criteria — An Interview with Jussipekka Leiwo
How much do you know about Common Criteria (CC)? It is a deep-tech domain not widely taught nor explored in many courses of study in...

Div0 Blog Editor
Aug 12, 20118 min read
73 views
0 comments


Defining Advanced Persistent Threat (APT)
Just mention APT in your presentation/product, people will come and listen to you. A passing remarked I received from my friend when I...

Div0 Blog Editor
Feb 19, 20111 min read
5 views
0 comments
BLOG: Blog2
bottom of page