Episodios

  • CTEM: The Future of Exposure Management – A Conversation with Dr. Ilia Kolochenko
    Jul 15 2025

    Dive into the evolving cybersecurity landscape with Dr. Ilia Kolochenko, founder and chief architect at ImmuniWeb. The discussion centers on the emerging field of Continuous Threat Exposure Management (CTEM) and its role in transforming how organizations approach cyber defense.

    Dr. Ilia shares his insights on why CTEM is more than just an evolution of traditional security practices—it's a strategic shift that consolidates tools, services, and data to provide centralized, risk-aware decision-making. He highlights how CTEM addresses modern cybersecurity challenges, from managing shadow IT to integrating artificial intelligence and reducing operational noise.

    Key Discussion Points:

    • What sets CTEM apart from traditional security practices like penetration testing and vulnerability scanning
    • How AI enhances CTEM by improving detection, prioritization, and decision-making
    • The role of CTEM to reduce alert fatigue and focus teams on actionable insights
    • How CTEM serves as a strategic enabler for compliance in Asia-Pacific's regulatory landscape
    • The ROI of CTEM and its impact on operational efficiency, employee morale, and cybersecurity resilience

    Whether you're a CISO, security professional, or just beginning your CTEM journey, this episode provides practical advice on how to start small and strategically integrate CTEM into your organization.

    👉 Listen now to explore how CTEM is shaping the future of cybersecurity.

    Más Menos
    46 m
  • LOGON live at Cyber Security World Asia, Tech Week Singapore 2023!
    Oct 17 2023
    We joined Asia’s most exciting cybersecurity event on 11th – 12th October 2023 at Marina Bay Sands, Singapore. This was the perfect event for CTOs, CIOs, CISOs, Heads of IT, Cloud Technology/Infrastructure, DevOps, and Digital Transformation from APAC’s largest Enterprises and the Public Sector to network with the entire IT industry. Meet Our Partners Cloudnosys platform delivers security, compliance, cost, and DevOps automation. Continually scan your entire AWS services for security and compliance violations for Network Security, IAM Policies, VPC, S3, Cloudtrail, etc. ImmuniWeb® award-winning AI Platform delivers Penetration testing, Dark web monitoring, and Attack surface monitoring to protect web and mobile apps, cloud and network infrastructure, and comply with regulatory requirements. Lansweeper’s IT Discovery & Inventory Platform enables companies to improve Cybersecurity to Software Asset Management and Cloud Sizing while optimizing IT spend across the enterprise covering IT, IoT, and OT assets. Contact us for more information on our partners. ***************************************************************************** Our Website: http://logon-int.com Contact us: https://logon-int.com/contact-us/ Email: sales@logon-int.com
    Más Menos
    2 m
  • Insider Threats: Protecting Your Business from the Enemy Within
    Sep 7 2023

    In today’s episode, we will discuss one of the most significant threats facing businesses today – insider threats, one of the most significant risks businesses face regarding data breaches and cyber-attacks. The threat can come from employees or other insiders from your company who have access to sensitive data.Joining us today is Alexey Raevsky, Ph.D., MBA, the CEO, and Co-Founder at Zecurion.

    • A reputable cybersecurity expert with 25+ years of professional experience.
    • Created a successful cybersecurity vendor. Zecurion is now a noticeable player in the global cybersecurity market. The company products are included in Gartner Magic Quadrant, recognized by Forrester, IDC, Radicati, Markets & Markets, etc.
    • A regular guest on TV- and radio programs as an IT and cybersecurity expert.
    • Co-author of several inventions patented in the US.

    Alexey will share his insights and experiences in dealing with insider threats and provide practical advice on how companies can mitigate the risks.

    Reference Links:

    • Leaflet - Zecurion Next Generation DLP
    • Zecurion Blog: Next Generation DLP for Forensic Investigations
    • Zecurion Blog: Key Types of Occupational Fraud: Recognizing the Problem
    • Zecurion Blog: Data Classification as Data Loss Prevention Necessity
    • Zecurion Next Gen DLP Solution Overview
    Más Menos
    11 m
  • What is Brand Impersonation and How to Prevent this Attack?
    May 2 2023

    In this episode...Have you ever received emails from Google, Amazon, or other big companies that seem fake? In most cases, it is a scam. Many big-name companies are now commonly used in brand impersonation scams to spread false information, steal credentials, and spread malware.These attacks leverage threats that may not directly appear tied to the impersonation attack but set the stage for such major attacks later. They target information about your organization and access to critical resources that allow them to launch an attack better.Luigi Lenguito, the Founder of Bfore.AI, will sit down with us to discuss these threats and show us ways to prevent brand attacks in the future. Reference Links:

    • Mimecast Survey, 2022

    • Bfore.AI Blog: Brand Impersonation - Cyber Threats 101

    • Bfore.AI PreCrime™ Brand Solution Overview

    Más Menos
    18 m
  • Preventing Social Engineering Attacks: Strategies in Asia
    Mar 29 2023

    Social engineering attacks, such as phishing, vishing, and scareware, exploit human vulnerabilities to bypass security measures and gain access to organizations’ sensitive data or systems. It has become increasingly common, and organizations in Asia are particularly vulnerable to these attacks due to the region’s fast-growing economies and increasing reliance on technology.

    The recent phishing attack happened to Singapore’s largest healthcare provider, SingHealth, in 2018. Using spear-phishing emails, the attackers got employees to download malware to their network, resulting in the theft of personal data belonging to 1.5 million patients.

    Finn Jensen, the CEO of FastPassCorp, will sit down with us to share his insights and experience in dealing with social engineering attacks and explore the most effective strategies for preventing social engineering attacks and protecting sensitive information.

    Reference Links:

    • Hacker group behind SingHealth data breach identified, targeted mainly Singapore firms, 2019

    • FastPass Blog: What is Vishing?

    • FastPass Blog: Vishing Cases have increased almost 550%!

    • FastPass Blog: Lessons learned from the Twitter Hack 2020

    • FastPass Blog: 50% of Data Breaches can be attributed to Leaked Credentials

    • FastPass Blog: 69% of IT Departments have been targeted by Vishing Attacks

    • FastPass IVM Certified for ServiceNow Store

    • FastPass Solution: Identity Verification Manager

    Más Menos
    20 m
  • How do we prevent web attacks during the shopping season?
    Dec 1 2022

    While Black Friday is historically known for retailers opening their doors early in the morning and selling items at deep discounts, cybercriminals have also capitalized on this tradition by launching web threats such as phishing campaigns and Magecart attacks.

    Our guest, Idan Cohen, the Co-Founder & CEO of Reflectiz, will sit with us in this episode to explain how hackers are targeting the holiday season and how you can protect yourself from cyber-attacks this year.

    Reference Links:

    • Online payment fraud increases by 208% amid the Black Friday season - SmartStateIndia

    • E-commerce Case Study - Reflectiz

    • Web Skimming Use Case - Reflectiz

    • Top 5 Most Common Web Threats for Black Friday 2022 - Reflectiz

    • The SolarWinds Supply Chain Attack: Implementing a Layered Security Approach - Reflectiz

    • 7 Ways to Ensure Supply Chain Security - Reflectiz

    • Magecart Strikes Again: Highly Organized Web Skimming Attacks Are Here to Stay - Reflectiz

    • Evasive New Skimmer is Used to Attack Retail and Finance - Reflectiz

    • PCI Use Case - Reflectiz

    • Major Use Cases Summary (Digital TAG Security; Website Privacy Enforcement; Web Supply-Chain Risks; Software Assurance; Web-Skimming; PCI Compliance) - Reflectiz

    • Reflectiz Solution Overview

    Más Menos
    16 m
  • Introduction | Welcome to LOGONtoCyberSecurity!
    Nov 29 2022

    In this introductory episode, our host, Lisa, shares the motivation behind starting this podcast and what you can expect from the informative sessions on cybersecurity with our esteemed and respected guests in our future episodes.

    Stay informed at all times with our series, and subscribe to our podcast to get the latest information and resources from each episode.

    If you have any questions or comments or hoping to join in as our potential guest speakers, reach out to us on social media or email us: Instagram (@logonasia_official) | Twitter (@AsiaLogon) | Email (marketing@logon-int.com)

    Visit us at www.logon-int.com and catch you on our next episode.

    Más Menos
    2 m