Philip Choo

0 Comments
The network is business-critical. Any network security threats that interfere with operations and infrastructure can have a significant effect. According to a recent study by IBM Security and the Ponemon Institute, each data breach typically costs an organization nearly $4 million. As the volume and severity of cyberattacks accelerate, understanding the biggest threats and what
0 Comments
Fellow security experts gathered at MPOWER 2019 to strategize, network, and learn about the newest and most innovative ways to ward off advanced cyberattacks. This year’s attendees had a special opportunity to hear from cybersecurity thought leaders as they shared their insights on our ever-changing industry. The latest applications, workload and infrastructure designed to protect
0 Comments
An Erosion trust, and a lack of situational awareness, are continuing to harm advancements in cybersecurity and digital transformation. Speaking at NTT Security’s Information Security World event in London, Thales CTO Jason Hart reflected upon the journey of 50 million users to radio, television, internet and, most recently, the Pokemon Go app. He likened this journey to the transformation of businesses
0 Comments
This is the Pixel 4, the handset that literally everyone saw coming. Even by Google’s standards, the handset leaked like crazy. Some was almost certainly by design as the company looked to hype up its new flagship amid slowing smartphone sales. That said, showing up for preorder on two different sites in the past few
0 Comments
You’ve heard it once; you’ve heard it a hundred times – “secure the cloud.” But what does that phrase mean? On the surface, it’s easy to assume this phrase means using cloud-enabled security products. However, it’s much more than that. Cloud security is about securing the cloud itself through a combination of procedures, policies, and technologies
0 Comments
New ESET white paper released describing updates to the malware arsenal and campaigns of this group known for its supply-chain attacks Today, ESET Research releases a white paper updating our understanding of the Winnti Group. Last March, ESET researchers warned about a new supply-chain attack targeting video game developers in Asia. Following that publication, we
0 Comments
Security incidents occur. It’s not a matter of ‘if’ but of ‘when.’ There are security products and procedures that were implemented to optimize the IR process, so from the ‘security-professional’ angle, things are taken care of. However, many security pros who are doing an excellent job in handling incidents find effectively communicating the ongoing process
0 Comments
Researchers have exposed the underhanded methods of a threat group responsible for unleashing a string of supply-chain attacks. Winnti Group has been targeting the gaming industry for nearly a decade. Their preferred mode of attack is to compromise game developers, insert backdoors into a game’s build environment, and then have their malware distributed as legitimate
0 Comments
Recently, Billington hosted their 10th annual Cybersecurity Summit, one of the premier cybersecurity conferences where industry leaders and government officials join together to discuss the current state of cybersecurity. Several key themes presented themselves throughout the two-day summit, including cloud, cybersecurity legislation, and DHS’s Continuous Diagnostics and Mitigation program (CDM). Kevin Cox, the program manager
0 Comments
ESET experts describe how they trained a machine-learning model to recognize a handful of unwanted UEFI components within a flood of millions of harmless samples UEFI (Unified Extensible Firmware Interface) security has been a hot topic for the past few years, but, due to various limitations, very little UEFI-based malware has been found in the
0 Comments
Today’s CISOs operate in an overly intensive environment. As the ones who are tasked with the unenviable accountability for failed protection and successful breaches, they must relentlessly strive to improve their defense lines with workforce education, training their security teams and last but definitely not least — looking for products that will upgrade and adjust
0 Comments
Permitting falsehood in political advertising would work if we had a model democracy, but we don’t. Not only are candidates dishonest, but voters aren’t educated, and the media isn’t objective. And now, hyperlinks turn lies into donations and donations into louder lies. The checks don’t balance. What we face is a self-reinforcing disinformation dystopia. That’s
0 Comments
New research has found that only a quarter of Americans know that surfing the internet in private browsing mode only prevents other users of the same computer from seeing what you’ve been up to online. A survey conducted in June by the Pew Research Center asked 4,272 adults living in the United States ten digital knowledge questions. When asked
0 Comments
An audit of Mississippi government institutions has revealed an alarming lack of compliance with standard cybersecurity practices and with the state’s own enterprise security program. A survey of 125 state agencies, boards, commissions, and universities conducted by the Office of the State Auditor (OSA) revealed that only 53 had a cybersecurity policy in place. Eleven