Sign in to view Yong Hua’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Singapore, Singapore
Sign in to view Yong Hua’s full profile
Yong Hua can introduce you to 10+ people at Synapxe
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
143 followers
141 connections
Sign in to view Yong Hua’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Yong Hua
Yong Hua can introduce you to 10+ people at Synapxe
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Yong Hua
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Yong Hua’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Activity
143 followers
-
Yong Hua Tan shared thisSamantha Pong is #hiring. Know anyone who might be interested?
-
Yong Hua Tan liked thisYong Hua Tan liked thisYesterday, I turned thirty — a year truly full of learning. The year leading up to this milestone was the most challenging time of my life so far. It felt as though life was moving at full speed, with many changes happening all at once. However, amidst the chaos came clarity. The toughest period taught me the most. It made me slow down, reflect deeply, and appreciate life in a new way. Here are ten lessons I have taken away from the past year. I hope they resonate with anyone going through a difficult time. Tough times do pass. 1. You are stronger than you think. Even when you do not feel it, you are. Simply showing up every day is proof of that. Be your own biggest supporter, especially when no one else can see the weight you carry. 2. There is always a way out. Even when everything feels stuck or hopeless, do not give up. The solution might not be immediate or obvious, but it does exist. 3. Be the captain of your own sail. Only you define yourself and decide how your life unfolds. Do not let anyone else write your story. 4. Time and energy are limited. Protect both. Spend them wisely — on people, goals, and experiences that truly matter. 5. Logic over emotions. Your emotions are valid and worth acknowledging, but do not stay stuck in them. Sometimes, logic helps more. Focus on what you can control — real change begins with action. 6. Have the courage to be yourself. It is not always easy in a noisy and pressuring world. However, staying true to who you are is powerful. 7. Owning your voice may shrink your social circle. When you form your own opinions, people’s views may polarize - And that is perfectly okay. Your vibe attracts your tribe. Staying true to yourself and being authentic will naturally draw the right people to you. 8. The right people make all the difference. Surround yourself with those who energize, uplift, and believe in you. A strong support system is vital, especially during hard times. 9. Own your insecurities. When you stop hiding your insecurities and start owning them, you take away anyone’s power to use them against you, and they cease to be insecurities. 10. There are no mistakes, only lessons. Every experience teaches something. When things go wrong, shift your focus from blame to learning. Ask yourself what the best lesson is that you can take from each experience. I would like to end this post with a quote from Steve Jobs that really resonates with me: “You cannot connect the dots looking forward; you can only connect them looking backward.” Everything happens for a reason. Trust the process, even when it does not make sense in the moment. Here is to living life intentionally and focusing on what truly matters. If you have read this far, thank you, and I wish you a lovely week ahead. P/S Photos taken yesterday at Xiangshan (Mt. Elephant) and Taipei 101 — the perfect way to start this new chapter.
-
Yong Hua Tan liked thisYong Hua Tan liked this🔥Researchers at MIT just introduced a language model that trains itself Also, it doesn’t need human-labeled data to improve. It generates its own training set, decides how to learn from it, and updates its own weights - all autonomously. Here’s how it works: 1. Reads a task or passage 2. Writes a custom “self-edit” (data + finetuning plan) 3. Finetunes itself using that 4. Evaluates the result and iterates And it works: ✅Beat GPT-4.1-generated data on a QA benchmark ✅Boosted accuracy from 33.5% → 47% ✅Hit 72.5% success on abstract reasoning tasks It’s not just answering questions, it’s designing its own training. That’s a whole new level of autonomy for LLMs. So if models can now update themselves… what’s our role in the loop? 🔍 Explore top MCP servers and start building powerful AI agents today! https://hubs.li/Q03sRFkL0 #artificialintelligence #llm #machinelearning #aiagent #genai #mit
-
Yong Hua Tan liked thisYong Hua Tan liked thisStateful vs Stateless Design — What's the Difference? Stateless design is a powerful model that has led to the development of simple yet highly scalable and efficient applications. “State” refers to stored information that systems use to process requests. This information can change over time as users interact with the application or as system events occur. 𝗪𝗵𝗮𝘁 𝗮𝗿𝗲 𝘀𝘁𝗮𝘁𝗲𝗳𝘂𝗹 𝗮𝗽𝗽𝗹𝗶𝗰𝗮𝘁𝗶𝗼𝗻𝘀? Stateful applications store data like user IDs, session information, configurations, and preferences to help process requests for a given user. A stateful design allows applications to provide a personalized experience to their users while removing the need to share data across multiple requests. 𝗧𝗵𝗲 𝗯𝗶𝗿𝘁𝗵 𝗼𝗳 𝘀𝘁𝗮𝘁𝗲𝗹𝗲𝘀𝘀 𝗱𝗲𝘀𝗶𝗴𝗻 As applications grew in complexity and received increasing amounts of traffic, the limitations of stateful design became apparent. Managing and maintaining session data adds significant performance overhead and complexity to a system. This complexity made it difficult for systems to scale horizontally as sharing state across multiple instances becomes a challenge. The rapid need for scalability and efficiency drove the popularity of stateless design. Instead of having mechanisms for state management, requests contained all the information needed to process it. This allowed systems to handle high levels of requests while adding flexibility to how the system scales, making it more resource efficient. The key applications of stateless design have been pivotal in several areas: ↳ Microservices & serverless computing: they exemplify statelessness, enabling services and functions to operate independently, thus enhancing scalability and resource efficiency. ↳ RESTful APIs & CDNs: by each API call or request containing all necessary information, stateless design simplifies operations & improves content delivery speeds. However, stateless design also presents certain challenges: • Larger request sizes: the need to include complete data in each request can result in increased data transfer, affecting performance. • Transmission inefficiencies: constantly sending full data sets can be less efficient than accessing centralized data in stateful designs. • Not always ideal: in scenarios inherently requiring state, such as complex user interactions, stateless design can add more complexity instead of simplifying the process. 𝗠𝗼𝘀𝘁 𝗮𝗽𝗽𝗹𝗶𝗰𝗮𝘁𝗶𝗼𝗻𝘀 𝗽𝗶𝗰𝗸 𝗮 𝗵𝘆𝗯𝗿𝗶𝗱 𝗮𝗽𝗽𝗿𝗼𝗮𝗰𝗵 between stateful and stateless design depending on the needs and constraints of each component. The key to a well-designed system is balance. It should be scalable, simple, and fast without sacrificing functionality. ~~ Thanks to our partner Render who keeps our content free to the community. 𝗗𝗶𝗱 𝘆𝗼𝘂 𝗸𝗻𝗼𝘄 you don't need AWS or GCP to build and scale an app? Render simplifies DevOps overhead. Check it out (it's free to try): https://lnkd.in/g5FxG4kT
-
Yong Hua Tan liked thisCan’t wait to launch this amazing collection in the region!Yong Hua Tan liked thisIntroducing the MCM Fragrance Collection: where fragrance meets personality. Six scents, six iconic spirits—distinctly daring and delightfully unrestrained. Created in close collaboration with MCM WORLDWIDE, the collection draws inspiration from their iconic leather animals, with each fragrance serving as an ode to playful self-discovery. Meet the animals below: 🐻Mighty Bear: An elegant Amber Woody Floral fragrance where each spritz is a bold yet elegant expression of resilience, capturing the essence of strength and sophistication for the modern trailblazer. 🐕Darling Doxie: A comforting Woody Spicy Floral aroma that honors loyalty and connection, wrapping you in a timeless, nurturing scent. 🐘Zen Elephant: A harmonious Chypre Leathery Floral blend that evokes a sense of wisdom and balance, inspiring a moment of quiet reflection and grace. 🐰Jolly Rabbit: A vibrant Citrus Floral Green scent that embodies joy and individuality, perfect for those who bring a spark of excitement to every moment. 🐶Charming Pup: An enchanting Floral Woody Orris aroma that exudes effortless charm and confidence, designed to leave a lasting impression. 🐲Daring Dragon: Ignite your senses with this Citrus Woody Tea blend that weaves an air of boldness and mystery, making it the perfect scent for those who embrace their power with confidence. Adventure awaits with the all-new MCM Collection. Which one speaks to you? Congratulations to our close partners at dsm-firmenich and all our IP employees who made this launch possible!🎉 #MCMFragranceCollection #MCMWorldwide #OneIP #OneTeam #OneDream
-
Yong Hua Tan liked thisYong Hua Tan liked thisCheck out this job at Mediacorp Pte Ltd: Senior Principal Security Analyst
-
Yong Hua Tan liked thisYong Hua Tan liked thisWe are proud to announce that Ensign InfoSecurity has been ranked the No. 1 Managed Security Services Provider (MSSP) in Asia and 6th globally in the 2024 MSSP Alert Top 250. This achievement marks our 5th consecutive year on the list and reaffirms our commitment to delivering AI-powered innovations that address today’s most complex cybersecurity challenges, empowering businesses to build resilience and stay ahead of emerging risks. View the report here: https://lnkd.in/ejUvCfn9
-
Yong Hua Tan liked thisYong Hua Tan liked thisThrilled to have presented at the APAC Partner Kick-off on February 1st! I’m grateful for the opportunity to showcase and delve into the technical intricacies of Kaspersky SIEM (KUMA) and XDR, showcasing the power of robust cybersecurity solutions. SIEM and XDR solutions has been available in the market for some time but its significance is being amplified by the current environment. Aptly put forward by Joyce Harkness , Director, Cybersecurity, Asia, Australia and NZ, during her presentation was that the cybersecurity industry is currently grappling with a multitude of challenges such as shortage of talents, tightening government regulations, industrialization of cyber crime and scale amplified by new technology trends, AI and synthetic media. Organizations nowadays have to start thinking of adopting and integrating technological tools and AI capabilities to keep up with the ever-evolving threat landscape and improve the efficiency of your IT team. Technologies such as SIEM and XDR plays a vital role in enhancing organization’s cybersecurity posture by improving threat detection (using AI capabilities), incident response capabilities, and overall security visibility. Provision of dashboard and reporting, and having capabilities to generate alerts based on predefined rules and correlation activities allows your IT team to focus on the important aspects: Incident response If you are keen to bolster your organization’s cybersecurity capabilities, feel free to check out the following link https://lnkd.in/gYxW4qvS Adrian HiaErnest ChaiBulat SiraevChristine ChongSiang Tiong (姚祥忠) YEOTAKEO KOBAYASHIJaydeep SinghGenie Sugene GanDerek TayBridget HuangTako Nijssen
Experience & Education
-
Synapxe
****** *******
-
******
** **********
-
****** ************
****** ***** ******** **********
-
********* ***********
**** ****** ******* *********** *********** *** ************** *********** undefined
-
View Yong Hua’s full experience
See their title, tenure and more.
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View Yong Hua’s full profile
-
See who you know in common
-
Get introduced
-
Contact Yong Hua directly
Explore more posts
-
ABP Securite
3K followers
From insights to innovation — our alliance partners brought it all to #GovWare2025! 🚀 Catch their thoughts, experiences, and takeaways in our exclusive highlights video. 🤝 Together, we’re shaping the future of cybersecurity. TEHTRIS Ivan Lo CBCI SSH Communications Security Raymond Ma Kaiting Thoe cPacket Josh Joiner Selina Yip EfficientIP Dominic Guan Elaine Loh Anomali Yen Nee Si ExtraHop Darren Chen June Lim Michelle Lee Lee Lee Yeo Stephanie Kwok Kenneth Chen 陳傑偉 Danny WAN Cyble Ts. Mohd Fadhly Mohd Hassim Kelvin Woo Kathryn Rose Villamin-Fernandez Sunnic Zhenxin Sun PHD/CISSP/CSSP #GovWare #Partnerships #Cybersecurity #Innovation #ABPSecurite
63
1 Comment -
Hussar Systems LLC | Palo Alto Networks
41 followers
Is your SOC team overwhelmed by repetitive alerts and manual ticket management, limiting your ability to scale security services efficiently? Logicalis Singapore transformed their security operations with Palo Alto Networks Cortex XSOAR, achieving unprecedented automation levels while serving their regional customers with a lean team of just five analysts. • Automated 90-95% of repetitive SOC incidents, including ticket creation, data enrichment, and even calling standby engineers for critical issues, drastically reducing manual workload. • Cut incident resolution time from 30-45 minutes per alert to just minutes, enabling analysts to focus on high-value tasks like customized reporting and use case development. • Gained a competitive edge by offering end-to-end managed detection and response services through 700+ out-of-the-box integrations and customizable playbooks. • Supported business growth without increasing headcount, demonstrating how automation enables scalable security operations for MSSPs. See how Cortex XSOAR can help your security team achieve similar efficiency gains and service differentiation. Explore Palo Alto Networks Quick Start Service: https://lnkd.in/gcDg3rrf Explore Palo Alto Networks Firewall Managed Service: https://lnkd.in/gTt-RcTB #PaloAltoNetworks #ResourceLibrary #PaloAltoNetworksResourceLibrary #CortexXSOAR #SOAR #SOCAutomation #MSSP #SecurityOperations #IncidentResponse
1
-
StarHub
71K followers
The strongest defence against cybercrime starts with people. Our CISO, Chuan Wei Hoo, reminds us that even as technology gets smarter, vigilance still comes down to everyday choices. A quick pause before clicking a link. Taking a moment to double-check an email. Not letting urgency override instinct. These small habits may seem ordinary, but they’re often what stop the biggest risks, especially when it comes to protecting our customers and our business. In a world where threats keep evolving, mindful behaviour remains one of the most powerful safeguards we have. Watch the video to hear why cybersecurity is not just about systems, but about people. #StarHub #StarHubLeadership #ThoughtLeadership #Cybersecurity
76
1 Comment -
Maurice Fielenbach
Hexastrike Cybersecurity UG… • 10K followers
You know the usual RDP-related event logs like EID 1149, but do you also know about HKCU\Software\Microsoft\Terminal Server Client\Servers? This registry key captures RDP connections made via the built-in mstsc\.exe client. Each subkey represents a remote endpoint the user tried to connect to, including the hostname/IP, the username used, and, in many cases, a certificate thumbprint when the RDP server certificate was marked as trusted. That certhash can be very useful during investigations. It helps determine whether the user connected to the legitimate system or an attacker-controlled evil twin host, something traditional logs often fail to reveal when they’re missing or incomplete. A crucial detail: these entries reflect *attempted* connections, not necessarily successful ones. And when you’re short on Windows event logs, it’s worth correlating them with the MRU positions stored under HKCU\Software\Microsoft\Terminal Server Client\Default, which do not reveal timestamps but at least show the connection sequence. #ThreatIntel #ThreatHunting #CyberSecurity #DFIR #IncidentResponse
541
2 Comments -
Singtel Global Services
29K followers
If your workforce is everywhere, your security should be too. As cloud-first becomes the default and hybrid work the norm, security can’t be tied to old perimeters or patchwork tools. Many organisations are turning to Security Service Edge (SSE) to simplify security while staying agile. Singtel Managed Security Service Edge (SSE) brings together advanced cloud-native protection with managed threat detection, service orchestration, and round-the-clock expert support—all in a fully managed, vendor-agnostic solution. Whether you’re securing a remote team, rolling out new apps, or expanding across regions, Singtel Managed SSE simplifies your security posture while keeping users, data, and infrastructure safe—wherever work happens. Read on to learn more: https://lnkd.in/gCXxUayb #CyberSecurity #ZeroTrust #CyberThreat #EdgeComputing
7
-
PCCW GLOBAL Limited
53K followers
It's a common misconception: SD-WAN is just a cost-cutting tool 🤔. However, what if it could be the strategic foundation for your entire digital transformation? In this fireside chat, PCCW Global's Alice Hui and Trent Blakely reveal how modern SD-WAN goes far beyond replacing MPLS to become a secure, agile platform that powers your cloud and SaaS applications. 👉 Watch the full fireside chat to learn more: https://lnkd.in/eXX2dgnn
47
1 Comment -
ATET Security
277 followers
🔐 Why ICT Vendors Should Care About Cyber Essentials and Cyber Essentials Mark In Singapore’s cybersecurity landscape, the Cyber Security Agency (CSA) Cyber Essentials programme defines a practical baseline for organisations to build basic cyber hygiene and resilience against common threats. While often discussed in the context of internal enterprise initiatives, its relevance is equally — and increasingly — important for ICT vendors that supply technology solutions, platforms, or services to customers. 🧠 What Is an ICT Vendor? An ICT (Information and Communications Technology) vendor is any organisation that provides technology products or services — whether software, platforms, managed services, cloud solutions, or hardware — to other businesses or government agencies. These vendors often integrate deeply into customers’ systems, serve as data processors or enablers, and have elevated access to customer environments. Why Cyber Essentials Matters for ICT Vendors ? 🔸 Demonstrates Foundational Security Cyber Essentials focuses on key controls like access management, patching, malware defences, and incident readiness — all fundamental to building secure products and services. 🔸Reduces Risk to Customer Environments Vendors with strong baseline security reduce the likelihood of being the weak link exploited in supply chain attacks — a real concern in modern cyber risk models. 🔸Signals Trust and Assurance to Customers Achieving the Cyber Essentials Mark provides a visible badge of cybersecurity commitment, boosting confidence among clients evaluating ICT partners. 🔸Aligns with Contractual & Regulatory Expectations Many customers — especially those in regulated industries — now expect vendors to demonstrate basic cyber controls as part of onboarding, procurement, and risk assessment. What ICT Vendors Should Do Next? ✅ Start with a baseline assessment of existing controls against the Cyber Essentials framework ✅ Prioritise fixes in high-impact areas — identity, patch management, and incident preparedness ✅ Integrate continuous monitoring and auditability into service delivery ✅ Educate internal teams on secure development/supply practices ✅ Engage professional cybersecurity consultancy and guidance - to prepare for certification - to close gaps effectively - to bake security into product lifecycles and service operations Cybersecurity isn’t just an internal safeguard — for ICT vendors, it’s a service differentiator and risk mitigator that matters to every customer interaction. 📌 Learn more about CSA’s Cyber Essentials framework and mark: • Cyber Essentials Mark: https://lnkd.in/gaZ8kzW7 #CyberSecurity #ICTVendors #CyberEssentials #CSA #SupplyChainSecurity #SMEs #RiskManagement #CyberGovernance #CyberResilience
-
Cyber Asia
4K followers
Singapore's critical information infrastructure will soon be required to report any incidents suspected to be caused by advanced persistent threats. CNA Cyber Security Agency of Singapore (CSA) Josephine Teo Ministry of Digital Development and Information Mandiant (part of Google Cloud) #cybersecurity #cyberattack #UNC3886 #singapore
7
2 Comments -
Tradepass
26K followers
Here comes the first fireside chat of Day 2! How can CISOs protect critical infrastructure from AI-powered attacks, ransomware & supply chain threats? Join Dr. Ir. Charles Lim (Deputy Head of Master of IT Program, Head of Cybersecurity (CoE), Head of Security Operation (SOC), Swiss German University) and Rendra Perdana (VP - Information Security, DANA Indonesia) as they discuss: 🔒 Securing energy, finance & healthcare sectors 🤖 Leveraging AI/automation for defense 🛡️ Proactive strategies against evolving threats #digitalCIO2025Indonesia #CyberSecurity #digitalCIOIndonesia #digitalCIO #CIO #CTO #ITleader #digitalCIO2025Indonesia
55
4 Comments -
Hong Kong Computer Society
5K followers
HKCS Webinar Series: CTEM in the Realm of Cloud and AI Adoption, held on 21 October 2025 and sponsored by Tenable, brought together cybersecurity leaders to spotlight Continuous Threat Exposure Management (CTEM). With insights from Daby Cheng and Willis Yung, we explored how CTEM transforms vulnerability management, strengthens financial-sector resilience, and empowers proactive defense in today’s AI-driven cloud landscape. #HKCS #Webinar #CTEM #CyberSecurity #CloudSecurity #AI
45
-
CTI Labs
325 followers
🚨 Surge in Microsoft Edge Exploits: 14 Critical Vulnerabilities Patched 📊 In June 2024 alone, at least 14 security vulnerabilities were identified in Microsoft Edge before version 138.0.3351.109, including those leading to remote code execution and denial of service. According to HKCERT, attacks leveraging these flaws posed active risk to over 329 million monthly Edge users, increasing the browser’s threat profile by 26% quarter-over-quarter. 🔍 Technical specifics reveal a mix of memory corruption flaws and insufficient sandboxing, potentially allowing an attacker to run malicious code or crash Edge remotely. Of the 14 CVEs linked, more than half enabled remote exploitation without requiring user interaction, and 3 were rated with a CVSS score above 8.0. The average patch latency for these flaws exceeded 21 days, underlining the importance of timely updates. 🛡️ Security teams must prioritize updating Microsoft Edge to at least version 138.0.3351.109. Patch deployment rates from previous months show organizations delaying browser updates face a 34% higher risk of post-exploitation lateral movement within their environments. Automated patch management tools can reduce update windows by up to 68%, closing critical gaps faster. 💭 With browser-based attacks growing by 18% in H1 2024, maintaining browser hygiene is integral to resilient endpoint defense. The data speaks for itself: lagging on browser patches directly correlates with increased exposure to high-impact exploits. #ThreatIntelligence #CyberThreat #BrowserSecurity #MicrosoftEdge #VulnerabilityManagement #InfoSec #IncidentResponse #ZeroDay #SecurityOperations source: https://lnkd.in/d8qQZyX9
-
Datacipher Education Services Private Limited
2K followers
Clear. Practical. Built for impact. From XDR and XSOAR to threat hunting and hands-on labs, our Palo Alto Networks training continues to help professionals sharpen their skills where it matters most. Engineers from Westcon Malaysia highlighted the clarity of delivery, the structured learning, and the practical labs that reinforced every concept. They also shared thoughtful suggestions for longer lab access, smoother lab performance, and deeper technical coverage; feedback that helps us refine and raise the bar every time. Here’s what they had to say. #DatacipherEducation #PaloAltoNetworks #CyberSecurityTraining #XDR #XSOAR #ThreatHunting #NetworkSecurity #LearningPath #RealFeedback
1
-
Fujitsu
1M followers
🔓 Your GenAI guardrails might not be as strong as you think. ⚠️ Ker Yang Tong, our Chief Technology Officer for ASEAN breaks down how GenAI systems are vulnerable to indirect attacks. Even when AI systems block sensitive questions, attackers can extract the same information by querying related data. As companies give LLMs access to sensitive information, understanding these indirect attack vectors is critical. 🤖 Hear more in this latest episode of Decoding the Future podcast, where we sat down with Stanley Tsang from Cyber Security Agency of Singapore (CSA) and Dr. Chris Marshall from IDC to discuss the real security challenges enterprises face scaling AI across LLMs, agents, and physical systems. 🎧 Watch the full episode on YouTube: https://okt.to/xjgt5v 🎙️ Also available on Spotify and Apple Podcasts. #DecodingtheFuture #AIGovernance #AISecurity #AISafety
34
-
SGBox
3K followers
𝗦𝗚-𝗦𝗢𝗖: 𝟮𝟰/𝟳 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗠𝗼𝗻𝗶𝘁𝗼𝗿𝗶𝗻𝗴, 𝗱𝗲𝘁𝗲𝗰𝘁𝗶𝗼𝗻, 𝗽𝗿𝗲𝘃𝗲𝗻𝘁𝗶𝗼𝗻 & 𝗿𝗲𝘀𝗽𝗼𝗻𝘀𝗲 SG-SOC as a Service by CyberTrust 365 provides enterprise-grade, around-the-clock cybersecurity monitoring and incident response, ensuring organizations are protected against evolving threats. Starting from the SIEM & SOAR capabilities of SGBox Platform and combining AI-driven analytics, expert security analysts, automated response workflows, the SOC acts as an extension of the final customer IT team to detect, investigate, and neutralize cyber threats in real time. Watch the full video on our You Tube channel to discover all the features and benefits of our SOC in “As a Service” mode. ▶️ https://bit.ly/3EExykI #SGBox #Cybersecurity #SOC
19
1 Comment -
Erudite Risk
3K followers
ICT minister urges cybersecurity overhaul after KT hacking scandal South Korea’s new ICT Minister Bae Kyung-hoon has called for a fundamental overhaul of the country’s cybersecurity system following a hacking breach at KT Corp. The incident involved unauthorized micropayments charged to nearly 280 KT subscribers, totaling over 170 million won ($122,400). Bae emphasized the need to move beyond reactive investigations to a proactive framework that allows for immediate intervention. Currently, authorities can only investigate cyberattacks after the affected company reports an incident, a limitation highlighted by KT’s delayed reporting despite early warnings from police. The minister criticized KT for prioritizing its reputation over transparency, and noted that many companies remain hesitant to report cyber incidents due to fear of penalties and lawsuits. Unlike the Personal Information Protection Commission, which can initiate investigations without waiting for company notification in data breach cases, the ICT Ministry lacks such authority over broader cyber incidents. Bae warned telecommunications networks remain prime targets for cybercriminals and advocated for holistic safeguards against app-based hacking and smishing attacks. He also revealed that the government is investigating similar suspicious activities at SK Telecom and LG Uplus to determine if the KT breach signals wider systemic issues. To address these challenges, the ministry established a cybersecurity reform task force led by Second Vice Minister Ryu Jae-myung. The group aims to push legislative changes granting the government powers for immediate intervention in large-scale cyberattacks, strengthen security audits, and close regulatory gaps. A key focus will also be supporting small and medium-sized enterprises, which are more vulnerable due to limited resources, through potential financial aid and a unified cybersecurity framework applicable across all sectors. In addition to cybersecurity, Minister Bae outlined a broader science and technology agenda, including a plan to become one of the top three AI powerhouses globally. The government will invest 10.1 trillion won in AI development in 2026, emphasizing a domestic AI semiconductor ecosystem, expanded data infrastructure, and regulatory reforms. Korea is also set to allocate a record 35.3 trillion won for overall research and development that year, aiming to rank among the top five global leaders in science and technology. Bae’s dual focus reflects a national strategy under President Lee Jae Myung’s administration to enhance both cybersecurity resilience and AI innovation. #AsiaRisk #CyberAttacksandDataLoss #SouthKorea https://lnkd.in/g36mKNqa
1 Comment -
Tech Observer Magazine
5K followers
With rising cyber threats and high-profile breaches, Asia Pacific's telecommunication sector must urgently strengthen security measures to protect user data and critical infrastructure. #CISOs #CybersecurityinAsia #KeeperSecurity #telecommunications https://lnkd.in/gNX67t9u
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More