Why We Exist

We believe secured computing is a right. Not a privilege.

"There are only two types of organizations: Those that have been hacked and those that don’t know it yet!" - John Chambers, Ex-CEO of Cisco Systems

Since our establishment in 2010? our raison d’être has been to assist organizations in ensuring the security and integrity of computer systems remain intact in the face of cyber threats around the globe.

However, with the increasing complexity of cyber attacks, most solutions are becoming increasingly outdated. Necessitating a more advanced solution.

Hence, it is our duty to protect computer systems from adversaries that most consider to be indefensible.

Our Achievements

Ranhill SAJ Partners with IASRG for Cybersecurity Services

Johor’s largest water utility services company recently partnered with IASRG to prevent future cybersecurity attacks. Emphasizing the growing influence of IASRG in the industry.

NFCC Satellite Lab Soon to be Established at Faculty of Computing, UTM

NFCC, the main agency in combatting financial crimes have agreed to open a satellite lab at Faculty of Computing, UTM. Facilitating further research collaborations.

Our Head of Research Group Raises Cybersecurity Concern within the Women's Community

Dr. Siti Hajar Othman, expressed worries about cybersecurity among women, covering issues like cyberbullying and self-image.

What We Do

00

Cyber Security Research

Our dedicated team of researchers constantly try to develop new approaches to tackle evolving and emerging threats in cyber security. By leveraging state-of-the-art approaches via Machine Learning and Deep Learning our team of researchers are able to tackle any challenge faced in the current and future cyber security landscape.

01

Cyber Security Services

Implementation of adequate cybersecurity measures is challenging. But no challenge is too big for our team at IASRG, as we leveraged various cybersecurity techniques, ranging from firewalls to open-source security monitoring systems.

10

Cyber Security Consultation

We are dedicated in exchanging and sharing our experience with cybersecurity practitioners or newcomers in this field. Our expertise ranges from basic cybersecurity implementation to complex topics, such as Blockchain security and Artificial Intelligence based threats.

Our Services
Our Capabilities
Documents
Advanced Persistent Threat (APT) Malware Analysis
Threat Modelling
Threat hunting
Network Monitoring
Advanced Persistent Threat (APT) Malware Analysis
Threat Modelling
Threat hunting
Network Monitoring
Advanced Persistent Threat (APT) Malware Analysis
Threat Modelling
Threat hunting
Network Monitoring
Scroll to Top