• Decoding Deep Packet Inspection (DPI): How It Works and Why It Matters

    The internet is a vast highway of data, with packets moving back and forth between users, applications, and servers. But how do organizations monitor, filter, and control this data? Enter Deep Packet Inspection (DPI)—a technology used by enterprises, ISPs, and cybersecurity professionals to analyze and manage network traffic beyond simple… Listen ⇢

  • What Is Deepfake Technology, and How Can You Identify It?

    Deepfake technology has been around for quite a while and has increasingly been used for spreading misinformation and impersonation. With the Singapore General Election approaching soon, this might become a greater concern for us. Imagine watching a viral video of a political candidate making a shocking statement—only to later find… Listen ⇢

    What Is Deepfake Technology, and How Can You Identify It?
  • Singapore’s Move to Unmask NRIC: Why It Makes Sense and What It Means for You

    Singapore is moving away from masking NRIC numbers, a policy introduced in recent years to protect individuals’ personal data. While this shift may raise concerns about privacy, there are strong reasons why unmasking NRIC numbers makes sense. In this post, I’ll break down why the change is happening, what risks… Listen ⇢

  • Optimizing Log Ingestion for SIEM: Reducing Redundancy and Leveraging a Data Lake

    In a production network, multiple security and networking appliances generate logs, including intrusion prevention/detection systems (IPS/IDS), firewalls, web servers, application servers, database servers, routers, switches, endpoints, and load balancers. If all logs from these devices are indiscriminately piped to a Security Information and Event Management (SIEM) system, it can lead… Listen ⇢

  • The Evolution of Phishing Emails: From Obvious Scams to AI-Powered Deception

    Phishing emails have come a long way from the poorly written, typo-ridden scams of the early internet days. Gone are the times when you could easily spot a phishing attempt due to broken English, strange formatting, or blatantly suspicious requests. Today, with the rise of Generative AI (GenAI), phishing emails… Listen ⇢

    The Evolution of Phishing Emails: From Obvious Scams to AI-Powered Deception
  • The Importance of Realistic Phishing and Red Teaming Exercises

    The Problem: False Sense of Security Many organizations pride themselves on conducting regular phishing awareness campaigns and red teaming exercises. However, there’s a common flaw in how these exercises are executed: they’re not truly realistic. In phishing campaigns, for example, word often spreads internally before the campaign even begins. Managers,… Listen ⇢

  • Phone Scams & Vishing: How to Protect Yourself from Voice-Based Fraud

    Have you ever received a call from someone claiming to be from your bank, the police, or a delivery company, urgently asking for your personal details? If so, you may have been targeted by a vishing scam. In this post, we’ll break down what vishing is, why scammers do it,… Listen ⇢

  • Decoding SOAR: Security Orchestration, Automation, and Response Explained

    As cyber threats continue to rise in volume and complexity, security teams often struggle to keep up with incident response and threat mitigation. Security Orchestration, Automation, and Response (SOAR) is a technology designed to address this challenge by improving security operations efficiency through automation and integration. What is SOAR? Imagine… Listen ⇢

  • The Hidden Dangers of Public WiFi and How a VPN Can Keep You Safe

    Public WiFi is everywhere—cafés, airports, hotels, and malls all offer free internet access. It’s convenient, but did you know that connecting to public WiFi can put your personal and financial information at risk? Hackers love public WiFi because it’s often unsecured, making it easy for them to steal passwords, banking… Listen ⇢

Meet the podcast host, Naomi Ellis.

Join Naomi's warm insights that turn complex biographies into relatable stories that inspire and educate the public.