Blogs
Strong project management, communication, and cross-group collaboration capabilities. Proven track record and highly effective at interfacing with internal and external stakeholders at various levels and building effective relationships and partnerships.
Former Technical Writer with experience working with international software companies on technical documentation, UX copy, research papers, blog posts, and online articles. Multi-talented in content strategy and writing for topics around cybersecurity and the threat landscape.
Experienced in working with teams with diverse backgrounds and cultures.
Blogs
With the rise of new technologies, such as mobility, cloud, and virtualization, enterprises need to adopt encryption to keep sensitive data secure, especially the data stored on-premise. In this blog, we emphasize the importance of key management when implementing a secure information gateway.
It has been a year after the massive breach on credit reporting giant Equifax, which exposed 143 million U.S. consumers to identity theft and other losses. Today, even more businesses are exposed to rapidly changing technologies that are hungry to produce, share, and distribute data.
Last September my colleague Alex Tay tackled the state of cybersecurity in Singapore and reasons for critical information infrastructure (CIIs) sectors to comply with the recent mandates from the Cyber Security Agency (CSA).
Why data encryption is your last line of defense in a data breach The recent SingHealth breach is considered the worst attack in Singapore history, resulting in the loss of millions of private records and sensitive data. The leaked data not only affects SingHealth, but everyone else who's had their data stolen.
For most people, securing a home wireless network rarely involves more than choosing a unique password. This should come as no surprise: networking is not exactly simple technology. A home network can connect all sorts of devices (computers, tablets, mobile phones, gaming consoles, and appliances, to name just a few) so that they can communicate with each other and the internet.
On Data Privacy Day, January 28th, we should have all taken a few moments to think more carefully about safeguarding our personal data, staying safe online, and improving our privacy habits. Just what does that mean in the age of IoT - the Internet of Things?
This month's Patch Tuesday release can be considered relatively light with only three Critical bulletins, with the remaining 10 bulletins rated as Important. As is usually the case, the cumulative update for Internet Explorer (MS15-043) is one of those rated as Critical. MS15-044 addresses critical vulnerabilities in Microsoft Font driver, which could allow remote code execution...
Last month, we published an infographic Know Your Enemies, which illustrated the different cybercrooks users may "meet" firsthand in the virtual neighborhood. Interestingly, a question was raised to us about the differences between the prices of user information. There are indeed discrepancies between the prices of credit cards between regions.
Reports and Research Papers
E-book that showcases Thales a leader in data protection for Malaysian banks moving into the cloud.
A handbook I wrote for Thales that highlights Singapore government regulations and how they can be mapped to Thales solutions
Wrote the 3Q 2015 TrendLabs Security Roundup titled "Hazards Ahead: Current Vulnerabilities Prelude Impending Attacks"
Wrote the TrendLabs 1Q 2015 Security Roundup titled "Bad Ads and Zero Days: Reemerging Threats Challenge Trust in Supply Chains and Best Practices."
VAWTRAK first made the rounds via attachments to fake shipping notification emails in August 2013. The attachment was actually a ZIP file that contained a malicious file, detected as BKDR_VAWTRAK.
Wrote the TrendLabs 2Q Security Roundup titled "Turning the Tables on Cyber Attacks: Responding to Evolving Tactics"
Wrote the TrendLabs 3Q 2014 Security Roundup titled "Vulnerabilities Under Attack: Shedding Light on the Growing Attack Surface"
Wrote the TrendLabs 1Q Security Roundup titled "Cybercrime Hits the Unexpected: Bitcoin- and PoS-System-Related Attacks Trouble Users"
Features and Advertorials
I authored a book titled "Life According to Tita" based on the @TitasofManila viral Twitter account I started.
Purefoods advertorial published in Working Mom Magazine; ABS-CBN publications
Asian Eye Institute (AEI) advertorial titled "Eyeing a Brighter Tomorrow" published in Working Mom Magazine; ABS-CBN publications
Wrote advertorial for Manila Genesis Charters and Tours
Wrote the text for the book “When I Look in the Mirror,” a project by fashion photographer Sara Black in collaboration with Dove and ABS-CBN Publishing.