Resources

Keep up with InsiderSecurity news and updates here.

Recent Posts

AllInsider LabInsightsNewsProduct Information

Detecting compromised accounts in Microsoft 365 with InsiderSecurity’s free CASUAL tool

InsiderLab conducts in-depth research of emergent cyber threats. We introduce a free...

Read More >>

7 Common Causes of Data Breach: Safeguarding Your Digital Assets

Data Breaches are an ever-present threat to enterprises. This article reviews 7...

Read More >>
Join InsiderSecurity at Booth 4K21 during the Singapore Fintech Festival

Complying with MAS-TRM and CCOP 2.0 Requirements with InsiderSecurity

Join us at Singapore Fintech Festival 2023, Booth 4K21, where InsiderSecurity will...

Read More >>

Solve the World’s Cloud Security Challenges with Singaporean Technology

InsiderSecurity is excited to unveil its latest cloud security product codenamed CSX,...

Read More >>

InsiderSecurity Analysis for Volt Typhoon Attacks

InsiderSecurity conducts in-depth research and analysis on Volt Typhoon Attacks, so as...

Read More >>

What are the 5 Key Areas of Cloud Security

It is essential to understand the fundamental principles on which cloud security...

Read More >>

Lessons From Recent Cloud Data Breaches

By analyzing these incidents and understanding what vulnerabilities led to these control...

Read More >>

Top Cloud Security Challenges in 2023

The cloud bring benefits for companies due to its agile and scalable...

Read More >>

InsiderSecurity Analysis for CVE-2023-23397 Microsoft Outlook Vulnerability 

CVE-2023-23397 vulnerability in Outlook has high severity score of CVSS 9.8. It...

Read More >>

Cybersecurity Code-of-Practice (CCoP) 2.0: Complying with InsiderSecurity

InsiderSecurity helps to meet CCoP 2.0 requirements that are challenging to comply...

Read More >>

Malware in the Cloud: Challenges and Best Practices

Malware as a cybersecurity threat has evolved over the years from a...

Read More >>
Uber Data Breach

Insights from the Uber Breach: Ways to Prevent Similar Attacks 

An in-depth analysis of the attack reveals how the attack occurred and...

Read More >>