BDO CyberDigest


By Jeffrey Gaor | 27 November 2023

Navigating the Complexities of Mobile Forensics: Understanding the Process in Depth

The widespread use of mobile devices poses numerous challenges for digital forensics professionals. As individuals increasingly rely on smartphones for communication, work, and personal activities, the importance of effective mobile forensics becomes evident. This article...


By Cecil Su | 21 November 2023

The Impact of Generative AI on Cybersecurity: Enhancing Innovation while Managing Risks

Artificial Intelligence (AI) has become pervasive, revolutionising various industries and transforming the way we live and work. One of the most significant advancements in AI is the emergence of generative AI, which has gained substantial popularity in recent years. While...


By Krishnaprasad Naidu | 30 October 2023

The Science of Staying One Step Ahead: Cyber Threat Intelligence Explained

Cyber Threat Intelligence (CTI) in the realm of cybersecurity is characterised by the systematic acquisition of information, followed by analysis and processing. This information is then utilised by security teams and decision-makers to enhance strategic efforts in fortifying...


By Cecil Su | 18 September 2023

The Intersection of Cybersecurity and ESG: Safeguarding Organisations in the Digital Age

In today's interconnected world, organisations face numerous challenges in meeting their environmental, social, and governance (ESG) targets while ensuring robust cybersecurity measures. The increasing frequency of cyber threats poses a significant risk to business operations,...


By Tok Huey Cheit | 07 August 2023

Embracing Generative AI

Generative Artificial Intelligence (AI) is a type of artificial intelligence that can generate new content by learning from existing data. This can be done by applying self-supervised or unsupervised machine learning to the data set obtained from various sources such as images...


By Gerald Tang | 12 June 2023

The Significance of Cross-Border Data Transfer for SMEs and MNCs

Personal Identifiable Information (PII), or as some countries would call it, personal data, has become the key for enterprises to offer innovative and customised service offerings internationally. In today’s volatility, uncertainty, complexity, and ambiguity (VUCA) world...


By Cecil Su | 22 May 2023

Protecting Your Business From Cyber Threats: The Importance of Third-Party Risk Management

As businesses continue to digitise and rely on technology, cyber threats are becoming more sophisticated and prevalent. As a result, more is needed for organisations to focus solely on their cybersecurity measures. However, they must also address the risks their third-party...


By Eric Tee | 15 May 2023

Ensuring the Security of Smart Contracts in Blockchain Systems: Challenges, Best Practices, and Future Directions

Blockchain technology is increasingly being used in various industries to facilitate secure transactions and provide transparency and trust. Smart contracts are a core component of blockchain systems, enabling the execution of automated transactions without the need for...


By Low Zhan Yuan | 03 April 2023

Striking a balance between offence and defence of cybersecurity: Purple Teaming

Security exercises, also known as security drills or simulations, are important for several reasons such as identifying vulnerabilities, testing of security incident response and meeting compliance requirements. These exercises are important tools for organisations to assess...


By Low Zhan Yuan | 03 April 2023

The Role of Artificial Intelligence in Cybersecurity - ChatGPT

Artificial intelligence (AI) is becoming an increasingly important game changer in the field of cybersecurity. With the rise of advanced cyber threats, traditional security measures are no longer enough to protect against attacks. AI offers a way to enhance cybersecurity...