TM Group’s telco business in Malaysia is operated by TM Technology Services Sdn Bhd

Learn More
SUBSCRIBE NOW

Subscribe to Get the
Latest News And Updates. No Spam. We Promise.

3 Kunci Kritikal Menangani Ancaman Keselamatan Siber

July 04, 2022
169

Of your peers have already read this article.

3:51

Minutes you'll spend on this story!

Ketahui bagaimanakah kerajaan Malaysia boleh bersiap siaga dalam mendepani ancaman dan risiko siber di era transformasi digital.

Keselamatan siber adalah antara cabaran utama masa kini buat setiap organisasi di era digital. Pendekatan dan solusi yang melangkaui aspek perlindungan perlu diperhalusi untuk mengekalkan kesinambungan perniagaan setiap organisasi.

Laporan global pertengahan tahun 2021 daripada pakar keselamatan siber yang berpangkalan di United Kingdom – Acronis,  menunjukkan bahawa kos purata pelanggaran/kebocoran data dan maklumat adalah sekitar AS$3.56 juta. Purata bayaran perisian tebusan (ransomware) pula meningkat sebanyak 33 peratus kepada lebih daripada AS$100,000.

Menurut ulasan dari pakar keselamatan siber dari TM One – cabang perusahaan dan sektor awam Telekom Malaysia Berhad (TM), COVID-19 telah mendedahkan syarikat dan organisasi kepada lebih banyak ancaman pencerobohan pangkalan maklumat. Persoalan tentang serangan siber kini telah menjadi ‘bila’ ianyanya akan berlaku dan bukan lagi ‘jika’ ia akan berlaku. Walaupun pelbagai langkah telah di ambil, kebanyakan organisasi masih berisiko dan terdedah kepada serangan.

Tahukah Anda?

50% daripada data Kerajaan yang menjadi sasaran, berpotensi untuk digodam, dengan akses kepada data melalui API.3 Ancaman Utama keselamatan ICT  terhadap pusat data sektor awam Malaysia:
1. Ancaman Teknikal
2.Perisian Perisik dan Phishing
3. Kejuruteraan Sosial

Sumber: Researchgate
152,653
Jumlah insiden Botnet Drones dan Malware dilaporkan di bawah MyCert pada Mac 2022.



Sumber: MyCERT

Dengan tumpuan untuk menyelami bagaimana sektor awam dan swasta boleh mengukuhkan tahap kesiapsiagaan keselamatan siber mereka, ramai pakar dari pelbagai bidang berkongsi pelbagai pandangan, pengalaman, dan pendekatan secara terbuka. Konsensus umum mendapati isu persekitaran IT yang kompleks adalah cabaran utama terhadap pelaksanaan keselamatan siber yang efektif.

Berikut adalah tiga kunci kritikal untuk menentang ancaman keselamatan siber:

Pengesahan ID yang lebih pantas

Gabungan teknologi blockchain dan kaedah biometrik menawarkan solusi yang lebih mantap dan selamat untuk mengesahkan identiti pengguna.

Pandemik COVID-19 telah memaksa lebih banyak organisasi mencari penyelesaian untuk membolehkan akses dari jauh (remote) kepada sistem. Memandangkan trend ini dijangka berterusan, pengesahan identiti pengguna adalah amat penting untuk keselamatan organisasi dan untuk memacu operasi yang lancar.

Sistem blockchain membenarkan data disimpan secara kolektif, yang menghalang sebarang gangguan/godaman. Pengguna boleh mendaftarkan butiran identiti mereka ke dalam sistem ini, dan organisasi keselamatan siber atau penyedia perkhidmatan seperti TM One kemudiannya akan memastikan ia tidak dapat ditembusi oleh penggodam.

TM One menawarkan penyelesaian Pengesahan Blockchain Terjamin (Blockchain Secure Authentication – BSA). Penyelesaian ini adalah sebahagian daripada tonggak Pusat Pertahanan Siber (CYDEC) yang fokus kepada perlindungan identiti digital. Ia adalah teknologi pengesahan tanpa kata laluan untuk mengelakkan serangan kelayakan (credential attacks), dimana penjenayah siber memintas langkah keselamatan organisasi dan mencuri data sulit. Langkah keselamatan melalui penyelesaian ini amat diperlukan terutamanya dalam sektor-sektor yang menyimpan data-data sulit dan peribadi pelanggan mereka seperti sektor Perbankan, Perkhidmatan Kewangan dan Insurans (BFSI), Sektor Kesihatan, Perkhidmatan Media Sosial dan Sektor Runcit.

Pengesahan blockchain adalah selamat, malah lebih pantas, dimana pengesahan pengguna boleh dilakukan dalam masa kurang daripada tiga saat. Penggabungan dengan sistem biometrik pula akan membolehkan proses pengesahan tanpa kata laluan sepenuhnya untuk pekerja sesebuah organisasi.

Teknologi biometrik, seperti sistem pengecaman muka, tidak memerlukan pengguna menghafal kata laluan. Terdapat banyak kes yang melaporkan penggodam mengakses dan mencuri kata laluan, dan pengesahan biometrik boleh membantu mengelakkan perkara ini.

Automasi sistem keselamatan

Automasi sistem keselamatan siber membolehkan pasukan IT mengoptimumkan sumber sambil mengurangkan kesilapan manusia dalam tindak balas keselamatan.

Automasi ini juga dapat memberi faedah yang melangkaui  aspek keselamatan siber. Aplikasi peranti mudah alih, Internet Benda (IoT), Kecerdasan Buatan (AI) dan automasi boleh digunakan untuk menggantikan tugas manual yang berulang sebagai sebahagian daripada usaha transformasi digital kerajaan dalam menyediakan perkhidmatan yang efektif dan selamat kepada rakyat.

Sebagai contoh, keselamatan pengumpulan maklumat sulit dan peribadi yang besar dalam sektor kesihatan melalui aplikasi yang membantu meningkatkan usaha pengendalian wabak. Inisiatif transformasi digital seperti ini akan membantu mengurus aliran data dan maklumat yang sulit dengan lebih baik tetapi ianya perlu dilakukan dengan menjadikan perlindungan privasi dan keselamatan data dan maklumat sebagai keutamaan.

Bekerjasama dengan pakar keselamatan siber

Banyak perniagaan tidak mempunyai peralatan dan kemahiran yang diperlukan untuk melindungi mereka daripada ancaman siber yang sangat kompleks dan sentiasa berubah dengan pantas. Sehubungan dengan ini, pilihan untuk bekerjasama dengan rakan kongsi keselamatan menjadi salah satu penyelesaian utama. TM One menawarkan perkhidmatan langganan yang merangkumi penyelesaian bertaraf dunia untuk membantu meningkatkan kemahiran pasukan keselamatan dalaman sesebuah syarikat atau organisasi.

Pasukan perkhidmatan profesional keselamatan siber TM One terdiri daripada arkitek, perunding dan penganalisa keselamatan. Arkitek memberi tumpuan terhadap reka bentuk sistem keselamatan, yang di bantu oleh pakar perunding. Sementara itu, penganalisa keselamatan akan memberikan maklumat operasi keselamatan dengan menilai ancaman secara berterusan.

Portfolio keselamatan siber bertaraf dunia TM One menyediakan pelbagai penyelesaian untuk melindungi sistem daripada ancaman siber masa kini. Malah, TM One telah menandatangani perjanjian dengan firma komunikasi global Telefonica untuk memperkukuhkan penyelesaian infrastruktur digitalnya dan menentang ancaman siber secara global. Kepakaran kedua-dua syarikat ini akan memberi organisasi di Malaysia penyelesaian keselamatan siber yang kukuh dan berdaya tahan siber yang tinggi.

Kesinambungan kesemua ekosistem keselamatan digital perlu dilakukan secara holistik. Dalam persekitaran yang sangat mencabar hari ini, kolaborasi dalam menangani keselamatan siber menjadi keperluan asas untuk membantu organisasi dalam kesiapsiagaan keselamatan siber mereka dengan lebih baik.

TM One akan terus memainkan peranan penting dalam membantu organisasi memperkukuh keselamatan siber mereka dan mengurangkan risiko serangan siber.

Adakah anda tahu apakah sumber utama risiko siber di Malaysia? Klik pautan untuk memuat turun maklumat grafik megenai risiko siber utama di Malaysia.

Artikel ini telah diterbitkan oleh Berita Harian pada 23 Jun 2022.

Cybersecurity: Is your company doing enough to protect itself from cybercrime?

March 09, 2023
191

Of your peers have already read this article.

4:10

Minutes time you’ll spend for this story!

Organisations are responsible to protect and safeguard their business and customer data from cybercriminals. They need to have the right tools, processes and above all the right people, a team of cyber-intelligence experts or security analysts, in place at all times

According to Technologist Dr. Saiyid Abdallah Syahir Al-Edrus, General Manager for Cybersecurity Services and Product & Innovation at TM One, every organisation has the responsibility to ensure that their cybersecurity strategies run in tandem with their business growth.

“Organisations are responsible to protect and safeguard their business and customer data from cybercriminals. They need to have the right tools, processes and above all the right people, a team of cyber-intelligence experts or security analysts, in place at all times.”

BusinessToday spoke to the industry expert who has over 15 years of experience in consulting, network security, endpoint security, cloud security, application & data security, and cybersecurity risk management, and who has leveraged his expertise to help organisations protect their businesses from the increasing challenge of cyber-attacks and threats.

He pointed out that many Malaysian organisations of all sizes and across all industries faced gaps between their perceived capabilities and their actual performance when it came to ensuring their cybersecurity strategies addressed the needs of their business.

“Organisations may believe that they have taken all the necessary steps to protect their data and systems, when they have not. This false sense of security has resulted in major global corporations and regional government agencies falling victim to massive security breaches.”

Dr. Saiyid also noted that organisations tended to become complacent. “Organisations often take for granted that they will not be the target for cyber-attacks, because they feel that they are not managing critical infrastructure and sensitive data. However, attackers will target any organisation that can provide them with a lucrative payoff.”

Lack of resources was a third factor, he added.

“Most organisations may not have the budget to invest in robust cybersecurity measures or the necessary expertise/personnel. Instead they often rely on general IT support. Unfortunately, cybersecurity itself encompasses a very huge spectrum and domain, for which you need specific skills, experience and knowledge.”

“Having an external partner that can provide professional and advisory services will help enterprises navigate and manage their cybersecurity strategy.”

Dr. Saiyid noted that while TM One, the enterprise and government sector arm of Telekom Malaysia Berhad is fully capable of providing a complete outsourced cybersecurity service to its customers, his preferred approach involved a hybrid solution between organisations and their cybersecurity partner.

“Cybersecurity strategies must be based on the organisation’s needs and priorities. My recommendation would be that policies are governed in-house, where the client dictates and determines which security services are needed and cybersecurity framework the organisation should adopt.”

Shifting Resources Purposefully

Responding to an IDC Enterprise Services Sourcing Survey, which stated that over 70% of Malaysian organisations recognised that security is not their core expertise, Dr. Saiyid pointed out that this view stems from understandable reasons – cybersecurity is generally underfunded and under-resourced.

“Businesses are often challenged to find and retain the right talents to manage digitalisation, cybersecurity, and innovation within their organisations. IT departments are now expected to support new revenue streams, on top of managing operational efficiency and reducing cost. Business leaders find it difficult to understand the ROI of IT security, and are more focused on growing their digital revenue – especially in the wake of COVID-19.”

As a result, meeting the need to secure these digital platforms can weigh on businesses’ priorities, requiring them to divert limited budgets and resources from opportunities to risk avoidance, Dr. Saiyid highlighted.

“In large organisations, managing cybersecurity efficiently requires a significant amount of resources and effort. Aside from the need to secure a well-equipped and complex IT environment, setting up a dedicated team means organisations need to invest in the technology and put together the security controls for the entirety of their IT environment. This can prove difficult as there is a marked scarcity of cybersecurity professionals, not only in Malaysia but internationally.”

With these realities, individual organisations should decide whether they want to outsource a certain portion of their cybersecurity responsibility or outsource the whole function.

“For instance, they can choose to retain identity management, which is the heart of IT operations and sits with Active Directory and domain controllers, while the rest, such as perimeter security, firewalls, intrusion prevention systems, or the 24/7 monitoring of the overall environment can be outsourced to the experts, like TM One.”

Service providers such as TM One can also provide organisations with round-the-clock protection, ensuring that their systems are always safe and secure. Furthermore, outsourcing cybersecurity can help organisations free up their internal resources so that they can focus on other areas of business.

TM One’s Professional Services supports organisations to assess their cybersecurity capabilities, and provides consulting and advisory services to help them strengthen their capabilities to respond to potential threats.

Specifically, TM One’s Cyber Defence Centre (CYDEC) is an end-to-end cybersecurity service which includes cybersecurity consulting or professional services to guide organisations carve out the best cybersecurity solutions that fit their needs and budget.

Through continuous support from TM One’s Security Operations Centre (SOC) and CyberAssurance services, organisations can benefit from managed security services to discover and address potential cybersecurity vulnerabilities, leverage solutions that help strengthen the readiness of in-house security teams, test systems to identify exploitable gaps, and monitor their broader business ecosystem to detect attacks or indicators of compromised systems and data more efficiently.

This includes Security Posture Assessment (SPA), Vulnerability Assessment and Penetration Testing (VAPT) services and Digital Attack Simulation either as a one-time engagement or a retainer programme.

Organisations who are interested to learn more about how TM One can help enhance their cybersecurity profile can visit its website at https://www.tmone.com.my/solutions/cybersecurity-services/.

This article was first published in Business Today

TM ONE addresses the unmet skills gap in cybersecurity

148

Of your peers have already read this article.

3:11

Minutes time you’ll spend for this story!

A proactive strategy is when businesses wholly employ a good cybersecurity framework including leveraging new technologies and trends to keep their systems secure. Utilising artificial intelligence (AI) in cybersecurity and automation to bring benefits to their overall operations.

Cyberattacks have now become a constant threat for businesses everywhere incurring cost and causing reputational issues, on top of other economic conditions that organisations have to contend with.

Despite the inevitability and increasing frequency of these attacks, most businesses have yet to adequately safeguard their infrastructure and systems, with today’s more sophisticated hackers finding new ways to attack businesses of all sizes.  

International Data Corporation (IDC) has reported that in 2021, Southeast Asian organisations spent a whopping US$3.2 billion on cybersecurity services, software and appliances.

Closer to home, the Malaysia Cyber Security Strategy 2020-2024 report states that the country may face economic losses of up to RM51 billion due to cyber threats. A study in VMware’s “The State of Incident Response 2021” report also found that 49% of organisations lack the expertise and tools for adequate incident response.

According toTs. Dr. Saiyid Abdallah Syahir Al-Edrus, General Manager, Cybersecurity Services, TM One, “A proactive strategy is when businesses wholly employ a good cybersecurity framework including leveraging new technologies and trends to keep their systems secure. Utilising artificial intelligence (AI) in cybersecurity and automation to bring benefits to their overall operations.”


AI has revolutionised the world by leaps and bounds, with AI in cybersecurity making it much faster to trace potential attacks, reduce the delay in response time and ultimately save man hours. Technology enables cybersecurity solution providers and analysts to analyse similar attack patterns and provide the necessary responses if there is a behaviour change. 

Emerging cybersecurity technology will now help to facilitate organisations become more proactive. This includes the utilisation of security information and event management through technologies such as Extended Detection and Response (XDR), Security Orchestration, Automation and Response (SOAR) and Next Gen Security Operations Centre (SOC).

This ensures that enterprises and the government sector are able to implement and maintain a proactive cybersecurity strategy, leveraging the skills and capabilities of dedicated specialised talents and reducing the impact to their own over-stretched IT teams.

TM One works closely with its customers by thoroughly assessing their security posture, technology maturity and business needs through its consulting and other value-added services. The firm has positioned itself apart from its competitors through Managed Security Services (MSS) as its core solution offering. 

TM One also recently received the prestigious Frost & Sullivan Best Practices 2022 Cybersecurity Company of the Year award. 

Their credibility is seen in the development of its products and solutions offered for the cybersecurity scene. According to TM One, most Malaysian organisations lack in-house security expertise, professionals and tools. This leads to them importing or outsourcing their security operations to ensure the security posture of business infrastructure and manage their cyber risks.

To address this issue, TM One provides a wide spectrum of cybersecurity solutions, helping organisations improve their security posture and business infrastructure as well as better manage their cyber risks via TM One’s Cyber Defense Centre (CYDEC).  

CYDEC’s extensive and comprehensive cybersecurity portfolio includes MSS, encompassing managed unified threat management, managed SOC, managed detection and response, cyber threat intelligence, managed anti-DDoS, managed web application firewall, vulnerability management, capture-the-flag service, cyber deception service, digital risk protection and many more. 

TM One’s cybersecurity consulting services also include, and are not limited to, security assessment and posture, vulnerability assessment and penetration testing, cybersecurity design and implementation, compromised assessment and digital attack simulation.

Fuelled by TM’s SOC and centralised cybersecurity platform, TM One’s CYDEC incorporates advanced technologies like predictive analytics and machine learning to help customers address evolving cyberattacks on-premises and on the cloud. As an added advantage, this extensive cybersecurity portfolio allows TM One to curate and customise solutions based on customers’ needs across various business sizes. 

TM One has continuously proven that the right solution alongside robust technology will augment organisations in safeguarding systems, especially within the current complexities of today’s digital landscape. Prioritising cybersecurity skills as one of the most important areas to be addressed, TM One is committed to addressing the industry’s current challenges and support businesses navigate the digital space with greater confidence. 

To find out how TM One can help you achieve world class cybersecurity, visit Cybersecurity Services and Solutions — TM One CYDEC

This article was first published in CEO Morning Brief – The Edge Markets

TM One, Enabling Your Next Innovative Transformation

163

Of your peers have already read this article.

2:29

Minutes time you’ll spend for this story!

Innovation is a key driver for organisations to generate new opportunities and to create greater value. It enables organisations to find fresh solutions to problems and generate value that they otherwise couldn't access. It takes leadership’s commitment to drive innovation across an organisation. With the right mix of people, tools and leadership, organisations can unlock their next advantage, today.

Innovation is a key driver for organisations to generate new opportunities and to create greater value. It enables organisations to find fresh solutions to problems and generate value that they otherwise couldn’t access. It takes leadership’s commitment to drive innovation across an organisation. With the right mix of people, tools and leadership, organisations can unlock their next advantage, today.

How organisations can move towards their NEXT phase of economic growth and create new business growth

What are the five top of mind factors that organisations should consider their NEXT phase of innovation?

  • Rebalancing organisational focus across three areas – business and operational performance; compliance; and being future-focused. Being future-focused must be an organisation’s main agenda in order to embed a new transformative culture, and to pivot towards making businesses more efficient to achieve a new measure of success.
  • Building for scale and resilience – adopting technology, cloudification, smart solutions, business analytics with AI and machine learning, and stronger cybersecurity is key for business growth and sustainability.
  • Partnerships – offer a unique opportunity for collaboration across ecosystems and cultures. By combining competencies and different perspectives, companies can quickly create innovative solutions that would otherwise be challenging to develop. Embracing partnerships allows companies to tap into new ideas for growth, and create value in a way that wouldn’t have been possible without collaboration.
  • ESG – embracing sustainability includes forward-looking value creation that enriches mid- to long- term value for communities, businesses and the Government. Tapping into resource-efficient solutions will also bring about differentiated user and consumer experiences.
  • Talent management –  in becoming future-focused, managing talent is key with greater emphasis on talent reskilling, upskilling, retention and effective recruitment. Improving talent management also includes adopting agile practices and digital workspaces, embracing a digital-first mindset that sets organisations apart.

“It is clear that taking advantage of technologies, coupled with strong partnerships will help build a more resilient and responsive ecosystem.” Shazurawati Abd Karim – Executive Vice President at TM One


TM ONE is your trusted partner in enabling your next advantage today and tomorrow by harnessing the power of human centered technology and innovation. We provide secure and robust fit-for-purpose business solutions to enterprises and the Government from across diverse industries, from banking to retail, oil & gas and energy, logistics, education, healthcare and many more.

We understand that every organisation has different needs and goals, with different business models, systems and operational landscapes.

Our end-to-end managed services and vertical solutions built across our pillars of connectivity solutions, data centres, cloud, cybersecurity and smart services which leverage the latest technologies empowers organisations to harness the power of big data and IR 4.0.

Together with our professional services teams across Malaysia and Indonesia, TM One offers value-based innovative solutions to businesses in line with TM’s role as the enabler of progressive innovative transformation.

TM One’s 5G Sphere, our circle of local and global smart solutions and technology partners, will also enable the next phase of enterprise innovation and transformation, harnessing 5G capabilities.

TM One’s 5G Sphere offers the opportunity for enterprises to springboard and accelerate their transformation, offering bespoke solution ideation and implementation to drive and generate positive business outcomes that address the unique needs of diverse businesses.

Register for your next advantage now at: 5g.tmone.com.my Your Next is Now.

This article was first published in Reuters Breakingview 2023

Cybersecurity an investment to protect Enterprises & the Government sector

146

Of your peers have already read this article.

4:10

Minutes time you’ll spend for this story!

External attacks can happen on your Information Communication Technology infrastructure, Internet of Things (IoT) or operational technology (OT) devices, your cloud environment, remote service attacks, your supply chain infrastructure, or even as part of social engineering whereby your employee is targeted and lured to divulge sensitive information.

TM One highlights inclusion of machine learning and predictive technology to sift out cyber threats

THE push for digitalisation has enabled the Enterprise and Government sectors to expand their reach and improve efficiency. But with more transactions done online, the risk of cybersecurity breaches has also risen.

Every year, millions of new security threats are created, which have cost businesses more than US$1tril in 2020 alone.

These incidents of breach not only expose organisations to data leaks and fraud attacks, they also erode brand value and could potentially damage customer trust, according to Dr Saiyid Abdallah Syahir al-Edrus, General Manager of Cybersecurity Services at TM One.

Unfortunately, awareness on the importance of cybersecurity and the impact of breaches to  organisations remains low.

Cybersecurity threats to organisations have been growing over the years from both external and internal sources and these attacks have also become more sophisticated over time.

“External attacks can happen on your Information Communication Technology infrastructure, Internet of Things (IoT) or operational technology (OT) devices, your cloud environment, remote service attacks, your supply chain infrastructure, or even as part of social engineering whereby your employee is targeted and lured to divulge sensitive information.

“Sometimes, disgruntled employees can also be a threat,” he added.

The importance of investing in well-rounded cybersecurity controls can’t be emphasised more, Saiyid noted.

Implementing a good combination of network and endpoint security controls such as a data leakage prevention system can help mitigate the situation. This includes regularly updating your software, improving detection capabilities, and reviewing your processes to respond to these attacks.

Educating employees in the proper use of IT facilities will also help.

Predictive advantage

As perpetrators become more advanced in their attacks, organisations will have to ensure that their security systems are 10 steps ahead.

One of the elements that TM One sees as increasingly crucial to deploying a robust cybersecurity system is the inclusion of artificial intelligence (AI) or machine learning, which allows enterprises and the government sector to become more accurate when predicting threats.

According to Saiyid, some organisations would typically sift through 50 to 100 security alerts in a day. Having machine learning capabilities or the right predictive tools will enable them to filter through these alerts quicker and identify true security threats more precisely.

“Before the use of machine learning, we needed human intelligence to do all the analysis to identify whether the alerts we get are a true positive or false positive. With machine learning, it helps us sift through hundreds of events and collect the data we need to confirm it as a true positive and to register that a true security incident is happening.

“But that doesn’t mean we should eliminate human intelligence from the process altogether, as we still need human intelligence to validate the outcome churned out by machine learning,” Saiyid explained.

Having predictive tools also helps organisations enhance their Security Operation Centres (SOC) with better mitigation and analytical abilities. This goes a long way in improving their productivity and efficiency when it comes to operations.

Customers, no doubt, have been favourable to integrating AI into their cybersecurity framework. The challenge, said Saiyid, is the availability of funds to invest in the technology.

“At TM One, we provide advisory services when we address the security controls they need to help them improve and defend their infrastructure. Via a consultative approach, we bring them through the journey of maturity. We understand that customers are at different maturity levels, so our approach is customised for each. It’s really about working with the customer and being able to help them find the best solution for their organization.”

“You can start small and build as you mature, and understand the value of cybersecurity and how it helps you defend your brand value and critical assets. You may not see your data as critical assets but they are,” he said.

Threading carefully

Notably, as with all forms of technology, there are risks in using AI. Even machine learning tools or AI platforms are susceptible to attacks or compromise.

“It really depends on how robust and secure your infrastructure is,” said Saiyid.

“It really depends on how robust and secure your infrastructure is,” said Dr. Saiyid Abdallah Syahir al-Edrus, General Manager of Cybersecurity Services at TM One.

If an organisation’s security infrastructure is not robust, there may be a possibility of a system manipulation or “data poisoning”. As machine learning relies on large data sets for analysis to determine accurate outcomes, organisations need to ensure the integrity and reliability of their data sets to avoid false predictions by the system.

Saiyid also urged enterprises and the government sector to consider multiple layers of check-and-balance cybersecurity mechanisms to ensure a resilient cybersecurity system and reduce over-reliance on AI only.

“Sometimes, the intention of data poisoning is to derail the focus of the system analysis to get the true positive incident or anomaly.”

“By diverting attention to somewhere else, the hacker is able to use loopholes to enter your system.”

Ahead of the curve

While machine learning is fairly new in Malaysia, the integration of AI in cybersecurity has advanced and this trend can help organisations in Malaysia.

“We started to develop services that leverage predictive technology as part of threat hunting, and others technologies that combine predictive tools and a bit of automation to respond to repetitive security incidents.”

TM One is also deploying cybersecurity with machine learning enabled in the IoT and OT security monitoring space.

To find out how TM One can help you achieve cost effective world class cybersecurity, visit www.tmone.com.my

This article was first published in The Star

Together, Let’s Create Success Stories

Help us know you better.

Which industry are you from?

One more quick question.

What solution are you looking for?

Our Experts Will Connect With You Soon.

Don't worry, we hate spam too.

If you agree to continue browsing, you accept the use of cookies on this site and have the option to disable them if you wish.

Accept & Continue