BDO CyberDigest


By Cecil Su | 17 March 2023

Five Essential Steps to Building a Resilient Cybersecurity Culture in Your Organisation

In today's digital age, cybersecurity threats have become increasingly prevalent and sophisticated, posing significant risks to organisations of all sizes and industries. A robust cybersecurity culture is essential to defend against these threats and protect an organisation's...


By Valen Sai Wynn Myat | 27 February 2023

DevSecOps and SDLC: Enhancing Security in the Software Development Process

The software development landscape has changed dramatically in recent years, with organisations facing unprecedented levels of change and innovation driven by new technologies and rapidly evolving business requirements. In response, the software development process has evolved...


By Krishnaprasad Naidu | 28 October 2022

Breaking The Cyber Kill Chain

The Cyber Kill Chain (CKC) developed by Lockheed Martin is a sequence of stages required for an attacker to infiltrate and exfiltrate data from a network successfully. It assists cyber defenders in understanding how adversaries conduct cyber offensive operations in 7 stages...


By Tok Huey Cheit | 28 October 2022

Building Cyber Resilience in Businesses

The inability to adequately respond to and manage cyber-attacks are often costly for organisations, leading to loss of consumer trust, diminished reputation, and economic losses due to theft of intellectual property or fines for the loss of confidential information, to name a...


By Jeffrey Gaor | 28 October 2022

The Growth & Dominance of Web 3.0

Web 3.0 or Semantic Web (as named by original creator Tim Berners-Lee) is a type of Internet that is based on blockchain technology and operates on token-based economics. Blockchain is a record-keeping system best known for enabling bitcoin transactions. The idea behind Web 3...


By Gerald Tang | 19 September 2022

Beyond Ransomware, What are Cyber Criminals Looking At? Can I Protect Myself Against These Evolving Cyber Threats?

Ransomware is the de facto threat organisations have faced over the past few years. Threat actors were making easy money by exploiting the high valuation of cryptocurrencies and their victims' lack of adequate preparation. The appreciation in the value of cryptocurrencies...


By Cecil Su | 09 September 2022

The Rising Concern of Data Privacy Around the World

For a long time, organisations large and small have been collecting data from their customers without their complete knowledge and consent. Since the true purpose of such data collection is kept hidden from consumers and tucked deep inside the terms and conditions, many...


By Low Zhan Yuan | 19 April 2022

Understanding the Rising Cyber Warfare Trends in the World

Cyber warfare is usually defined as a cyberattack or series of attacks that targets a country. It has the potential to wreak havoc on government, civilian infrastructure and disrupt critical systems which result in damage to the state and even loss of lives. Cyber warfare...


By Jeffrey Gaor | 04 April 2022

Dissecting the Dark Side of the Net

What are your thoughts when you hear the word “Dark Web”? Or if you have heard about it, have you imagined how transactions are being done with the use of computers in this digital age? The Dark Web is known as the core of illegal online activity and its landscape is always...


By Eric Tee | 24 March 2022

Strengthening the Cybersecurity Posture with Adversary Emulation

Adversary emulation is a type of red team engagement that leverages on tactics, techniques, procedures (TTPs) that were used by adversaries to mimic real world intrusion campaigns. Adversary emulators build a scenario to test certain aspects of an adversary’s TTPs. An...