Resources
Browse through our wide selection of resources—from product information and
reports to latest company announcements.
reports to latest company announcements.
Browse through our wide selection of resources—from product information and reports to latest company announcements.
Insider Lab

Exploitation of “xp_cmdshell” in MS SQL: Critical Risks & How to Defend
Discover how attackers abuse the powerful xp_cmdshell feature for privilege escalation, lateral movement, and system control. Learn defenses, risks, and mitigation strategies

M365 Botnet Password Spraying Attack
Discover how a botnet is targeting Microsoft 365 tenants through password spraying attacks. Learn how attackers bypass MFA, evade detection and what strategies to protect organisations.

CapitalOne data breach: How SSRF vulnerability exposed 100 million customer records
Learn how the CapitalOne breach exposed 100M records via an S3 bucket vulnerability. Discover AWS security insights, detection strategies, and ways to prevent attacks

Imperva Hack: AWS RDS Breach, Data Exposure & Cybersecurity Detection Strategies
Discover the Imperva hack that compromised cloud security. Learn about the data breach, detection strategies, and future-proofing your business from such attacks.

Cisco WebEx sabotage: How a disgruntled ex-employee caused $2.4 million in damages
Discover how a disgruntled ex-employee sabotaged Cisco WebEx, causing $2.4 million in damages. Learn key cybersecurity lessons and detection strategies to prevent similar attacks
Insights

What is UEBA? A Quick Guide to User and Entity Behavior Analytics (UEBA)
Explore the critical role of UEBA in modern cybersecurity. This guide covers how UEBA works and how it enhances security measures against complex cyber threats

A comprehensive guide to Singapore cybersecurity compliance
Discover the essentials of Singapore cybersecurity compliance, covering government, financial, healthcare, and telecommunication sectors, and learn how to enhance your organization's cybersecurity measures.

Hybrid cloud security – Top challenges and best practices
Uncover hybrid cloud security challenges and best practices, addressing visibility, misconfigurations, network protection, skills gap, and compliance. Discover key insights for a secure hybrid cloud strategy

7 Common causes of data breach: Safeguarding your digital assets
Data Breaches are an ever-present threat to enterprises. This article reviews 7 key issues that lead to a data breach and what can be done to mitigate the risks

What are the 5 key areas of cloud security
It is essential to understand the fundamental principles on which cloud security is built before cloud adoption may be implemented properly. Learn a few of the key areas within cloud security and how they all work together.

Top cloud security challenges in 2023
The cloud bring benefits for companies due to its agile and scalable nature. However, at the same time, cloud adoption presents unique security challenges as well.
News

InsiderSecurity Recognised as One of Asia-Pacific’s High-Growth Companies by Financial Times
This recognition highlights our exceptional growth trajectory, driven by our cutting-edge solutions in AI cybersecurity and User Behaviour Analytics

InsiderSecurity recognised as one of Singapore’s Fastest Growing Companies by The Straits Times
InsiderSecurity recognised as one of Singapore's Fastest Growing Companies in 2025 by The Straits Times. A leader in cybersecurity innovation, driving growth across Asia

Advanced cloud security solution developed in ASEAN for cloud misconfigurations and cloud breaches
InsiderSecurity launches CSX, a cloud security solution that detects misconfigurations and data exposures, enhancing visibility and protection across clouds

InsiderSecurity is now CSA STAR Level 2 certified
InsiderSecurity is the FIRST cybersecurity software company from Singapore and likely Southeast Asia to achieve the CSA STAR Level 2 Certification

InsiderSecurity is now ISO 27001 certified
InsiderSecurity achieves ISO 27001 certification with zero non-conformities and is honored with Quality Excellence Award by BSI

Complying with MAS-TRM and CCOP 2.0 requirements with InsiderSecurity
Join us at Singapore Fintech Festival 2023, Booth 4K21, where InsiderSecurity will share on how to simplify MAS-TRM and CCOP2.0 compliance
Product Information

Smart Log Review Brochure
Automates the analysis and review of user activity logs, to achieve both compliance and security.

Database Activity Monitor Brochure
Simplifies database security monitoring, especially for the cloud

Automated UEBA Brochure
Detect malicious user activity early in your on-premise or cloud infrastructure