Number of reported incidents

Number of systems with known vulnerabilities

The ultimate reference guide to cybersecurity threats

Time from detection to containment to eradication

Number of days to deactivate former employee credentials

Number of users with "super user" access level

Frequency of review of third-party access

Bolstering Defence with Singtel's Next-Gen Advanced SOC

You may also like