DiscoverSecurityLah - the Asian Cyber Security Show
SecurityLah - the Asian Cyber Security Show
Claim Ownership

SecurityLah - the Asian Cyber Security Show

Author: SecurityLah

Subscribed: 1Played: 0
Share

Description

Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
23 Episodes
Reverse
Open any international news portal and ransomware dominates the headlines. In this episode, the team examines ransomware and how it affects organizations and even individuals globally. 
The SecurityLAH team reviews the Interpol Cyber Security report focused on the ASEAN region, putting some rationale into the data provided. Some insights into the type attacks and why. 
The question that often runs on everyone's mind. Which educational path should one take? Increase skills and ability through professional training, or pursue academic achievements through post degree programs? 
The Edge Market reported that ePay, a product of GHL may have experienced a breach. The hosts at SecurityLah deep dive into this issue, looking at all of the publicly available data to get into the meat of the matter, or the bits in the cyber, so to say... 
The abomination called passwords become centerstage discussion in this episode. The bane of everyone's existence, passwords, while becoming the reality of technology and computing, is fast becoming an issue. Data leaks, breaches makes it difficult for an average user to use it effectively. We discuss at length about passwords and what are the alternatives, both to business and end users. 
Monetary Authority of Singapore recently released a circular to update the requirements previously published under the Technology Risk Management guidelines, in view of addressing issues that recently plagued many organizations through Solarwinds supply chain attack. We review the requirements to see what are the changes and how it impacts organizations. 
The Internet powers the world, while the submarine cables powers the Internet. We explore the not-so-public life of submarine cables, the cabotage system and how it affects global Internet and network connectivity, with Australian telco publisher Grahame Lynch from Communications Day.
Some mobile apps were DEEMED not secured and countries banned them. What happened and why lah?
Semiconductors power almost everything around us. From mobile phone, computers, connected devices and even cars. The world relies on its semiconductor supplies to keep manufacturing processes running. We explore the tilt in the semiconductor suppliers and how it affects the globe, with Australian telco publisher Grahame Lynch from Communications Day.
Prof described Deep Fake as algorithms duking it out with each other. Is it? What is it? If deep fakes get any more realistic than they already do, will we know what's real anymore?
Hacking for hire is a lucrative business. The SecurityLAH! team was divided on some things, but in general, there is consensus that Dark Basin's business could close and pack up, but it will likely pop up again somewhere.Interestingly this was the first episode recorded by SecurityLah last year! It took us a while to schedule and release this episode, competing with other more timely episodes. 
Someone wanted to buy the breach data of UniKL? Who is it?Found out in this episode of SecurityLah!A Malaysian university was hacked by a threat actor. A host published the matter in Linkedin, just to find the matter commented by the actual hacker. This is the interview between the host and the hacker. First ever, a view from the hacker perspective. Article link: http://bit.ly/unikl-hackFurther reading: https://www.linkedin.com/pulse/hacker-perspective-unikl-hack-dr-suresh
A Malaysian university was hacked by a threat actor. A host published the matter in Linkedin, just to find the matter commented by the actual hacker. This is the interview between the host and the hacker. First ever, a view from the hacker perspective. Article link: http://bit.ly/unikl-hackFurther reading: https://www.linkedin.com/pulse/hacker-perspective-unikl-hack-dr-suresh
This is the final part on the interview with Keith Rozario, we continue the conversation around Macau Scam, SayaKenaHack and data breaches.
In the earlier episode, we had dwelved into what Macau Scam is. In this episode, we speak to our contact Keith Rozario, who has had experience in some aspects of the Macau Scam. This is the first part of the 2 part series. 
We speak to Aidila Razak from Kinilabs on data transparency and COVID-19. This is the final instalment in the series. 
Ep 6. Macau Scam

Ep 6. Macau Scam

2021-03-0113:03

We've been hearing a lot about Macau Scam. What is it? Do you have to go Macau to be scammed? Listen on!
The discussion with KiniLabs (Aidila Razak) continues on COVID-19 and the data aspect of the pandemic, specifically on data transparency. 
 Rioters stormed Capitol Hill, the US government's administrative building in early January. Large-scale and believed to have been organised via social media, do social media platforms need to put stricter censorship into effect? 
Malaysia took drastic steps to combat COVID-19, which resulted in the declaration of emergency. We look at the aspect of data transparency and how it affects the initiatives of battling the COVID-19 pandemic. 
loading
Comments 
Download from Google Play
Download from App Store