Resources
Keep up with InsiderSecurity news and updates here.
Recent Posts
Detecting compromised accounts in Microsoft 365 with InsiderSecurity’s free CASUAL tool
InsiderLab conducts in-depth research of emergent cyber threats. We introduce a free...
Read More >>7 Common Causes of Data Breach: Safeguarding Your Digital Assets
Data Breaches are an ever-present threat to enterprises. This article reviews 7...
Read More >>Complying with MAS-TRM and CCOP 2.0 Requirements with InsiderSecurity
Join us at Singapore Fintech Festival 2023, Booth 4K21, where InsiderSecurity will...
Read More >>Solve the World’s Cloud Security Challenges with Singaporean Technology
InsiderSecurity is excited to unveil its latest cloud security product codenamed CSX,...
Read More >>InsiderSecurity Analysis for Volt Typhoon Attacks
InsiderSecurity conducts in-depth research and analysis on Volt Typhoon Attacks, so as...
Read More >>What are the 5 Key Areas of Cloud Security
It is essential to understand the fundamental principles on which cloud security...
Read More >>Lessons From Recent Cloud Data Breaches
By analyzing these incidents and understanding what vulnerabilities led to these control...
Read More >>Top Cloud Security Challenges in 2023
The cloud bring benefits for companies due to its agile and scalable...
Read More >>InsiderSecurity Analysis for CVE-2023-23397 Microsoft Outlook Vulnerability
CVE-2023-23397 vulnerability in Outlook has high severity score of CVSS 9.8. It...
Read More >>Cybersecurity Code-of-Practice (CCoP) 2.0: Complying with InsiderSecurity
InsiderSecurity helps to meet CCoP 2.0 requirements that are challenging to comply...
Read More >>Malware in the Cloud: Challenges and Best Practices
Malware as a cybersecurity threat has evolved over the years from a...
Read More >>Insights from the Uber Breach: Ways to Prevent Similar Attacks
An in-depth analysis of the attack reveals how the attack occurred and...
Read More >>

Detecting compromised accounts in Microsoft 365 with InsiderSecurity’s free CASUAL tool
InsiderLab conducts in-depth research of emergent cyber threats. We introduce a free tool to aid in detecting similar attacks and compromised accounts


7 Common Causes of Data Breach: Safeguarding Your Digital Assets
Data Breaches are an ever-present threat to enterprises. This article reviews 7 key issues that lead to a data breach and what can be done to mitigate the risks


Complying with MAS-TRM and CCOP 2.0 Requirements with InsiderSecurity
Join us at Singapore Fintech Festival 2023, Booth 4K21, where InsiderSecurity will share on how to simplify MAS-TRM and CCOP2.0 compliance


Solve the World’s Cloud Security Challenges with Singaporean Technology
InsiderSecurity is excited to unveil its latest cloud security product codenamed CSX, at Govware 2023. CSX already won an award at CSA Innovation Day 2022


How User and Entity Behavior Analytics (UEBA) helps with modern-day attacks
Traditional security is insufficient against advanced cyber threats. UEBA offers a new approach, focusing on user behavior rather than devices or locations


InsiderSecurity Analysis for Volt Typhoon Attacks
InsiderSecurity conducts in-depth research and analysis on Volt Typhoon Attacks, so as to equip companies with the knowledge to proactively protect themselves


What are the 5 Key Areas of Cloud Security
It is essential to understand the fundamental principles on which cloud security is built before cloud adoption may be implemented properly. Learn a few of the key areas within cloud security and how they all work together.


Lessons From Recent Cloud Data Breaches
By analyzing these incidents and understanding what vulnerabilities led to these control failures, companies can ensure they are not exposed in a similar way.


Top Cloud Security Challenges in 2023
The cloud bring benefits for companies due to its agile and scalable nature. However, at the same time, cloud adoption presents unique security challenges as well.


InsiderSecurity Analysis for CVE-2023-23397 Microsoft Outlook Vulnerability
CVE-2023-23397 vulnerability in Outlook has high severity score of CVSS 9.8. It affects everything from Microsoft 365 apps for enterprise to Outlook 2013 SP1


Cybersecurity Code-of-Practice (CCoP) 2.0: Complying with InsiderSecurity
InsiderSecurity helps to meet CCoP 2.0 requirements that are challenging to comply with. As a leader in cybersecurity, our solutions are useful for small teams.


Malware in the Cloud: Challenges and Best Practices
Malware as a cybersecurity threat has evolved over the years from a nuisance to a devastating multi-billion-dollar industry that can bring governments and companies to their knees.