Skip to content

Cyber Intelligence

Your trusted resource for cyber security content. We aim to provide our customers clarity on the evolving cyber threats and effective strategies on how to safeguard digital assets.

What Most Penetration Testers Get Wrong — Lessons from the Field

In today’s complex digital environment, a simple automated scan just doesn’t cut it. Modern cybercriminals have an abundance of channels through which they can gain access to sensitive information, ranging
Read More

How NetAssist’s Managed SOC Takes a Proactive Approach to Cybersecurity Via Purple Teaming

In today’s increasingly dynamic threat landscape, a reactive approach to cybersecurity is no longer sufficient to combat ever-evolving cyber-attacks. Traditional Security Operation Centres (SOCs) typically focus on monitoring, detecting, and
Read More

Keeping cyber security costs low: How to budget in compliance with Malaysia’s Cyber Security Bill 2024

With the recent introduction of Malaysia’s Act 854, businesses who are classified under the National Critical Information Infrastructure (NCII) must comply with new regulatory requirements, impacting on their financial budget
Read More

Data Protection: What You Need to Know About The Latest PDPA Amendments

As our nation continues to move toward rapid technology adoption, protecting the personal data of Malaysian citizens is becoming an increasing concern for policymakers. The government has recently introduced several
Read More

The Digital Shield: Why a Robust Cybersecurity Policy is Your Organization’s Best Defense

The differences between Cyber Security Policy and IT Policy within an organization: Cyber Security Policy: Purpose: A cyber security policy provides guidance to an organization’s employees on how to act
Read More

The 4X4 of PDPA

Data Breach Notification: A New Compliance Challenge for Malaysian Businesses
Read More