-
Yu Ming Keung wrote a new post on the site MIS5208 Spring 2017 7 years, 9 months ago
Phishing emails are one of the most significant issues rising over the past year. it can deliver ransomware and other hazardous threats to businesses and enterprises of all sizes. Many advanced phishing emails […]
-
Yu Ming Keung wrote a new post on the site MIS5208 Spring 2017 7 years, 9 months ago
The article I read for this week is about a windows, android malware exploited by a cyberespionage group to target organizations in the Middle East. According to the security firms, the group uses Windows and […]
-
Yu Ming Keung wrote a new post on the site MIS5208 Spring 2017 7 years, 10 months ago
The threat was discovered in the mid of January this year when it was targeting multiple owners of Github repositories via phishing emails, but cyber-security firm Palo Alto, who reported the campaign on Tuesday, […]
-
Yu Ming Keung wrote a new post on the site MIS5208 Spring 2017 7 years, 10 months ago
Talking about the use of Big data in cybersecurity, it can help the government setting with a number of high-profile use case examples, how the internet-of-things(IoT) is taking a firm hold in helping government […]
-
To add to your post Yu Ming, these days big data techniques used to mine databases are being adopted by the military to glean more information from many different types of data it collects—from drones, automated cybersecurity systems, terrorist databases and many other sources which is helpful in performing military operations and hence is becoming a useful technology.
-
-
Yu Ming Keung wrote a new post on the site MIS5208 Spring 2017 7 years, 10 months ago
The biological national security is facing a dramatic issue and it may be ripped from the page because American pharmaceutical companies and the health-care sector are not doing enough to secure biological […]
-
Yu Ming Keung wrote a new post on the site MIS5208 Spring 2017 7 years, 11 months ago
According to the Symantec research, it showed that many workers are not aware of the security risks associated with using their own devices for business. This can expose IT and indeed the whole business to risks. […]
-
Yu Ming Keung wrote a new post on the site MIS5208 Spring 2017 7 years, 11 months ago
Detecting the Undetectable
This week, I read this article “Detecting the Undetectable” from Info-security magazine. Since modern breaches mostly involve a mix of chameleonic deception and clever automation, ena […]-
I like your article Yu Ming. In light of the fact that attacks are increasingly evolved and sophisticated, the reality is there is no longer a one size fits all approach to security. To defend against the modern cyber threat, organizations need a multiple-faced approach, and not to fall into the trap of implementing one measure. Those automated antivirus software or controls can easily be bypassed, which means that we need to think about defence-in-depth and monitoring-in-depth strategies to detect the undetectable.
-
-
Yu Ming Keung wrote a new post on the site MIS5208 Spring 2017 7 years, 11 months ago
I read an article in regards to a new concept “Fast Data” instead of Big data. Data is growing at a fast rate where each person will create roughly 1.7 megabytes of new data per second by 2020. With that being sai […]
-
Yu Ming, when it comes to fast data, it is important to capture the value in it properly. In fact, the best way to capture the value of incoming data is to react to it the instant it arrives. If businesses are processing incoming data in batches, they’ve already lost time and, thus, the value of that data. To process data arriving at tens of thousands to millions of events per second, they will need two technologies: First, a streaming system capable of delivering events as fast as they come in; and second, a data store capable of processing each item as fast as it arrives.
-
-
Yu Ming Keung wrote a new post on the site MIS5208 Spring 2017 7 years, 11 months ago
I read an article of EY regarding using data analytic in fraud detection. Since we have learned that ACL/Data analytics can be one of the tools for auditors to detect fraud in our previous classes. Fraud is […]
-
Yu Ming Keung wrote a new post on the site MIS5208 Spring 2017 8 years ago
My name is Yu Ming(Marco) Keung. I am a full time graduate student in the IT Auditing track in my second semester. I am from Hong Kong and I have been studying in the U.S for 5 years. I am expecting to graduate in […]
-
Yu Ming Keung wrote a new post on the site Auditing Controls in ERP Systems 8 years, 2 months ago
Diamond Foods Control Failure
-
Yu Ming Keung and Abhay V Kshirsagar are now friends 8 years, 4 months ago
-
Yu Ming Keung wrote a new post on the site Yu Ming Keung 8 years, 4 months ago
Yu Ming Keung
Degree: Master of Science in IT Auditing and Cyber Security
Graduation: August 2017
Specialization: Information Technology Auditing
My name is Yu Ming Keung […]
-
Yu Ming Keung created the site Yu Ming Keung 8 years, 4 months ago
-
Yu Ming Keung's profile was updated 8 years, 4 months ago
In the case of cybersecurity, fire must be fought with fire, or in this case, with automation. Companies must seek out and enforce preventative solutions that use automated methods of prevention. One such technology that preventatively protects companies and enterprises of all sizes is the Content Disarm and Reconstruction technology (CDR). CDR technology processes incoming files, analyzes and breaks down the content structure, then rebuilds a duplicate file with no loss of functionality – all in real-time. Through this process, end-users are able to receive any file, free of both known and unknown threats because CDR removes any content that is not approved by the organization. Machine learning is still in its early phases and phishing will only become more insidious as the technology matures and the process becomes even more automated.