Cyber resilience in 2025: when an “a” isn’t enough 

We sat down with our new Singapore Managing Director, Daisy Radford, to hear her thoughts on the  local threat landscape.

Cybersecurity in Singapore has long been seen as a strength, and in the latest SecurityScorecard report, 91% of Singapore’s top 100 companies (by market capitalisation) earned an A-grade rating, but all 100 had suffered some sort of breach. And with breaches growing more sophisticated and interconnected, it’s becoming clear that traditional checklists and best practices aren’t enough. We sat down with Daisy Radford, Reversec’s new RVP in Singapore, to talk about what she’s seeing on the ground, and what’s really keeping tech and risk leaders up at night.

Q: What’s the biggest misconception you’re seeing among leadership teams when it comes to cyber risk?

That cybersecurity and business continuity planning are things you “set and forget.” I still hear phrases like, “We’ve got that covered, we did a review last year.” That’s like saying your financial governance is all locked up… because you had an audit once. Cyber risk is dynamic. Threats evolve. And your digital ecosystem, from software to third-party partners to user behaviour, changes faster than most risk registers can keep up with.

Q: What kinds of threats are you seeing companies struggle to prepare for?

We’re seeing two key challenges. First: multi-party breaches that spread through ecosystems. These aren’t direct attacks. They start with a supplier, or a supplier’s supplier and spiral. Often the company getting hit doesn’t even use the compromised tool or platform. That’s a huge blind spot and a complex gap to fill.

Second: targeted campaigns, often state-linked, that focus on critical infrastructure. In recent weeks, a number of Ministers have been openly discussing the level of threat and quantity of attacks our critical infrastructure is under. These groups don’t just want data, they look for long-term access. They’ll sit quietly in a system, studying how it works, waiting for the right moment. The techniques are quiet, evasive, and not easy to spot using legacy detection tools or standard approach assurance work.

Q: Are most companies ready for that kind of complexity?

Not yet, though many are starting to wake up. Boards are asking better questions, and CISOs are being pulled into earlier strategy conversations. That’s a good sign.
But many organisations are still heavily reliant on vendor assessments and annual tabletop exercises. Those are useful but they don’t give you a live picture. They don’t tell you what’s happening now in your ecosystem. And in a supply chain-driven breach, speed matters. Minutes, not days.

Q: You’ve worked across global markets. Is there something unique about the Singapore landscape?

Singapore has incredibly strong talent and some of the most advanced digital infrastructure in the world. But that also makes it a high-value target. From financial services to critical infrastructure, attackers see this as a strategic node.
And in sectors like finance and energy, the assumption used to be “We’re too established to fall.” But maturity doesn’t stop a zero-day from spreading via a trusted platform. No matter how strong your own controls are, you’re only as resilient as your weakest connected partner.
Q: So what does “prepared” actually look like in 2025?

Prepared is having visibility. Do you know which vendors have access to sensitive systems? Do you know their vendors? Can you map the blast radius if one of them is compromised?
Prepared also looks like practiced response. Not a PDF, but real-time coordination – across IT, legal, comms, leadership and the board.
And finally, it looks like mindset. Resilience isn’t a department’s job. It’s an organisation-wide posture.

Q: If you had one message for Singapore’s business leaders right now, what would it be?

Don’t assume you’re safe because you passed last year’s pen test. Cyber resilience is not a trophy. It’s a muscle. And if you’re not flexing it continuously, you’re falling behind.
Singapore is well-placed to lead in this space. But only if we move beyond checklist compliance and start treating cyber like the live, systemic business risk it is.
Reversec helps organisations build resilience across their digital supply chains, through our expertise in ecosystem visibility, threat intelligence, and real-world incident playbooks.

Want to explore how we can help your business prepare? Reach out!

Foundry
Hardware Security

Page under construction

We’re currently building something exciting… Come back soon to check it out!

Meanwhile, read about Reversec’s Hardware Security services below.

What is purple teaming? Key benefits and how it works

What is purple teaming

Threat actors are getting smarter, and traditional red-blue team silos leave blind spots. Purple teaming bridges the gap by offering a more integrated approach, combining offensive expertise with defensive implementation to create a more comprehensive security strategy. Purple teaming isn’t just a technical exercise; it’s a strategic investment in your security posture. When done correctly, it delivers many benefits across detection, collaboration, and culture.

Beyond the terminology, what does purple teaming actually look like in practice, and how can it transform your security operations from reactive measures to proactive protection?

Blending of red and blue

Red teams focus on the offensive side, simulating real-world attackers. Their role is to imitate how a threat actor might breach defenses, achieve specific objectives, and often remain concealed.

In contrast, blue teams are defensive. They monitor threats, respond to incidents, and work to protect the organization’s systems and data.

Purple teaming integrates these two perspectives, yet not everyone interprets it similarly. For some, it is merely a red team exercise followed by a review: the red team attacks while the blue team attempts to detect them. If the defenders manage to identify something, the assumption is that purple teaming has occurred.

A collaborative approach

At its best, purple teaming isn’t just a sequence of tasks, but a focused, hands-on collaboration. Instead of separate teams reviewing each other’s work, think of it as an ongoing dialogue where defenders and attackers team up to strengthen your security from all angles.

Our team values collaborative, in-depth discussions. This can involve sitting side by side with team members, guiding them through tactics step by step. Whether you’re connecting over Teams or sitting around the same table, the goal stays the same: open collaboration and learning together.

The goal isn’t just to see if the blue team can detect the red team. It’s to strengthen detection capabilities, refine understanding, and close the loop between offence and defence.

Key benefits of going purple

  • Enhanced detection capabilities: One of the most immediate gains is the enhancement of detection mechanisms. Since the red team is sharing precisely what they’re doing and when, the blue team can correlate activities with real-time alerts, logs, and monitoring data. This insight helps tune detection rules and signatures, identify blind spots in monitoring systems, and understand which attacks fly under the radar and why. Purple teaming helps blue teams to recognize issues in real time and facilitate improvements accordingly.

  • Faster feedback loops: Traditional red team exercises can take weeks or months, and it may take even longer for blue teams to receive detailed feedback. Purple teaming dramatically shortens this cycle. With both teams working in sync, feedback is continuous and iterative. If something isn’t detected, changes can be made on the spot. Success can be analyzed and documented immediately. This facilitates faster refinement of tools, tactics, and procedures, making the overall security function more agile and responsive.

  • Realistic, high-fidelity simulations: Purple teaming often emulates specific threat actors or attack chains, unlike abstract tabletop exercises or isolated penetration tests. These are not random attacks; they are deliberate, structured scenarios based on real-world threats, including the tactics, techniques, and procedures (TTPs) employed by nation-state or advanced persistent threat (APT) groups. This realism is crucial as it ensures your defenses are tested against adversaries’ actual techniques, not merely theoretical ones.

  • Enhanced collaboration between teams: Purple teaming promotes a significant cultural shift. Red and blue teams, which often function in isolation or even in competition, come together. This collaboration fosters trust, empathy, and shared understanding. Red team members develop an understanding of the pressures and limitations faced by defenders. Blue team members gain insights into the mindsets and strategies of attackers. This mutual visibility fosters improved communication and enhances teamwork, which can extend into daily operations beyond the exercise.

  • Clarity over ambiguity: By discussing everything openly and frequently in real time, there is significantly less ambiguity regarding what occurred, what was observed, and what was effective. This clarity helps to identify meaningful improvements and prevent the finger-pointing or vague conclusions that sometimes accompany traditional testing.

  • Stronger security culture: Ultimately, purple teaming fosters a mindset of continuous improvement. It promotes curiosity, transparency, and a collective sense of purpose. Instead of focusing solely on scoring points or outsmarting the other team, everyone collaborates to enhance the organization’s security. This cultural shift can be as significant as any technical fix, laying the groundwork for a more mature and resilient security organization.

Purple teaming isn’t a fixed methodology; it’s a mindset that encourages transparency, learning, and constant improvement. While different organizations may interpret it uniquely, the approach’s core lies in collaboration.

As threats evolve, breaking down barriers between red and blue teams could provide the edge your organization needs.

Purple Teaming

Purple Teaming

Read more

Related content

Whitepapers

Purple teams with wings – Measuring detection efficacy in the cloud

June 1, 2024
Purple teams with wings – Measuring detection efficacy in the cloud
Our thinking

Application-level purple teaming

October 1, 2022
Application-level purple teaming
Webinars

Webinar: Redefining offensive security – The evolution of red teaming and beyond

March 31, 2025
Webinar: Redefining offensive security – The evolution of red teaming and beyond

Reversec quarterly research brief

Q3 REVERSEC Research Brief

Dive into cutting-edge research that drives smarter security decisions

Download

Here’s what’s inside:

Last quarter, our cybersecurity research focused on two critical areas: cloud security with modern attack paths and privilege escalation techniques, and emerging technology trends with a strong emphasis on GenAI security. These priorities reflect what we see across the industries we work with. Most organizations are now cloud native, which means cloud-focused attack paths have become standard practice in real-world breaches. At the same time, many are implementing LLM applications, making vulnerabilities and guardrail bypass techniques a growing concern.

In this update, we share our latest findings along with practical recommendations to help security teams mitigate these threats. The brief comes in multiple formats, including conference talks you can watch on demand and detailed cybersecurity research articles from our labs.

Key themes in our recent cybersecurity research:

  • SharePoint bypasses that defeat Conditional Access and DLP controls. Attackers are using pre-signed URLs to quietly exfiltrate data from restricted environments.
  • Azure DevOps pipeline credential exposures. A single compromised developer account can cascade into full production access.
  • AWS ECS privilege escalation. Attackers are leveraging legitimate functionality to move laterally across containerized environments.
  • OneDrive to Entra role escalation. A clever use of Known Folder Move and PowerShell profiles to gain admin access.
  • Oracle database link exploitation. Forgotten connections between development and production environments are opening up lateral movement paths.
  • LLM agent security. We have published six architectural patterns to help you defend against prompt injection and model manipulation.

PLUS: new updates for open-source tools like SPIKEE for LLM testing, STRIFEBOT for Snowflake attack simulation, and IAMSpy for AWS policy analysis.

This is not research for research’s sake. It is designed to help you make informed decisions, prioritize your defenses, and stay ahead of attackers who are already using these techniques in the wild.

Ready to dive deeper into our cybersecurity research?
Download the full report now for complete insights.

Q3 Reversec Research Brief

Dive into cutting-edge research that drives smarter security decisions

Download


Subscribe below to get our quarterly
research update delivered straight to your inbox.👇 

This site is protected by reCAPTCHA and the Google
Privacy Policy and Terms of Service apply.

Related content

Whitepapers

Whitepaper | The illusion of security in Microsoft’s cloud defaults

October 9, 2025
Whitepaper | The illusion of security in Microsoft’s cloud defaults
Our thinking

Top 5 common misconfigurations in cloud environments – and how to avoid them

January 28, 2025
Top 5 common misconfigurations in cloud environments – and how to avoid them
Our thinking

fwd:cloudsec Europe 2024: Staying Sneaky in Microsoft Azure

October 4, 2024
fwd:cloudsec Europe 2024: Staying Sneaky in Microsoft Azure

Whitepaper: The illusion
of security in Microsoft’s cloud defaults

Secure by default? Think again.

Microsoft’s cloud services are convenient, but not inherently “secure by default.” Defaults prioritize ease of deployment, not hardened protection. Attackers know this and exploit blind spots in Entra ID, SharePoint, and Microsoft’s token model to move undetected.

This whitepaper looks at why Microsoft’s default set of cloud settings should only be treated as a foundation. It shares real-world attack methods from our recent research on Entra ID and SharePoint and how small configuration oversights can create security failures. It also gives practical recommendations for organizations that want to improve their cloud security posture.

In this whitepaper, you’ll learn:

  • Why Microsoft’s defaults prioritize functionality over security and how attackers take advantage.
  • Real-world attack techniques: token theft, ghost device registration, consent phishing, and service principal abuse.
  • Why detection in Microsoft’s cloud ecosystem proves difficult, and why premium licenses become necessary for real visibility.
  • The configuration oversights and collaboration features, like tempauth, that put sensitive data at risk.
  • Practical recommendations for your security team to move beyond “secure by default” with governance, monitoring, and active defense.

👉 Download our whitepaper to uncover real attack techniques and learn how to defend!

This site is protected by reCAPTCHA and the Google
Privacy Policy and Terms of Service apply.

Related content

Our thinking

Top 5 common misconfigurations in cloud environments – and how to avoid them

January 28, 2025
Top 5 common misconfigurations in cloud environments – and how to avoid them
Whitepapers

Microsoft Azure Security Framework

August 5, 2021
Microsoft Azure Security Framework
Our thinking

fwd:cloudsec Europe 2024: Staying Sneaky in Microsoft Azure

October 4, 2024
fwd:cloudsec Europe 2024: Staying Sneaky in Microsoft Azure

fwd:cloudsec Europe 2024: Staying Sneaky in Microsoft Azure

Heavy Metal Debugging

Mobile tool: drozer

NYDFS 500 – Plan for stronger cybersecurity compliance

What recent NYDFS 500 compliance updates mean for regulated entities


The NYDFS 500 Cybersecurity Regulation, a dynamic framework, is designed to safeguard New York’s financial institutions from the escalating threat of cybercrime. Enforced by the New York Department of Financial Services, the regulation mandates stringent cybersecurity measures, including risk assessments, designation of a qualified CISO, and comprehensive incident response protocols. Since its inception in 2017, the regulation has evolved significantly, with recent amendments introducing heightened requirements to address common cyber vulnerabilities. The report delves into the enforcement actions taken by NYDFS, highlighting key compliance challenges and offering strategic recommendations to fortify cyber security defenses.

It includes:

  • Top 10 List of most impactful new requirements to the covered entities.
  • Analyses the types of security incidents and the sections of the regulation that were found to have been violated.  

WHITEPAPER

NYDFS 500 – Plan for stronger cyber security compliance

Download

Related content

Our thinking

NYDFS 500 cybersecurity regulation: What’s changed?

August 31, 2023
NYDFS 500 cybersecurity regulation: What’s changed?
Our thinking

NYDFS 500 vs. DORA: Comparison for European financial institutions

February 16, 2024
NYDFS 500 vs. DORA: Comparison for European financial institutions
Webinars

NYDFS 500: Simplifying the second amendment

June 13, 2024
NYDFS 500: Simplifying the second amendment

Red teaming – The Reversec guide to rainbow teaming

This whitepaper demonstrates how the practical and technical Red team delivery processes lead to real-world impact. For readers who have taken part in similar testing activities already, the paper will help explain how to boost the benefits of that pre-existing investment.

Driven by industry advancement in recent years, there is now a broader range of initiatives available to support the development of an organization’s cybersecurity posture across the Predict, Prevent, Detect, and Respond (PPDR) model. Combined, these are colloquially referred to as a “Rainbow Team”, delivering purple (collaborative), blue (defensive), red (offensive), and gold (crisis management) activities. When delivered sequentially and continuously, organizations gain the ability to utilize outputs from each development area and measure incremental improvement.

WHITEPAPER

The Reversec guide to rainbow teaming – Red team

Download

Related content

Our thinking

Do you need a red team?

January 14, 2023
Do you need a red team?
Our thinking

Red team diaries: Cyber

November 17, 2022
Red team diaries: Cyber
Our thinking

Red team diaries: Physical

November 14, 2022
Red team diaries: Physical