In 2021, NFT or Non-Fungible token had become the hottest trend in the trading world. Many had shown their interests on the buzzword, even celebrities. With the trading volume skyrocketed in the third quarter of 2021, it is almost believable that NFT will become the next normal of the trading world in the future. However,

Medical robotics had slowly grows over the years with the advancement of technology. In the year 2020, Covid-19 pandemic had opened our eyes and mind to the importance of medical robotics. Many hospitals had started to adopt more robots in order to reduce the risk of the spreading of Covid-19 in the healthcare environment. The

National Cyber Security Policy (NCSP) is a by-product of the national level to carry out the National Cyber Security Strategy that is based on strategy intent to be in, from current where they are, and level up from where the national are. In execution, we keep saw lot of countries attempt to “smart copy” from

In our time, industrial and critical infrastructures are adopting Internet of Thing (IoT) at an unprecedented rate. While digital transformation in operational technology (OT) can optimise production, drive innovation and increase efficiency, it is not without the risk of increasing cyber threat. Without a proper OT cyber security, our OT device is highly exposed to

Take Care in Handling the Results of Your Web Application Testing

What is the risk of Internet of Behaviour (IoB)? An article released by Gartner, in October 2020, stated that “IoB does have ethical and societal implications depending on the goals and outcomes of individual uses”. Therefore, while the IoB has been recognised its contribution especially in business and healthcare, its risk should not be disregarded.

The cyber attack kill chain is a series of steps that trace stages of a cyberattack from the early reconnaissance stages to the exfiltration of data. The kill chain helps us understand and combat ransomware, security breaches, red-teaming attack lifecycle and advanced persistent attacks (APTs). In brief, Cyber attack kill chain involves several core stages,

What is Computer Network Defense? Computer Network Defense (CND) is a set of procedure and securing measures that use computer networks to detect, monitor, protect, analyze and defend against network infiltration resulting in service or network denial, degradation and disruptions. CND will acknowledge against an unauthorized activity, for instance within the Department of Defense (DoD)

E-SPIN Integrated Cyber Security Center Facility

World had moving toward digitalization and replace traditional industry and sector, digital economy become mainstream worldwide. From corporate and e-government digital transformation (DT),  it become one of the mission critical infrastructure (MCI) regardless of country size, all will invest heavily to make sure at the national level maintain competitiveness in this national core competency. To

Lists of Major Myths in Zero Trust Architecture

Zero trust architecture is focused on what the business needs and to be functionally in organization systems by implementing network-centric date security that provides access to the only person who needs it. In a legacy network, organizations have little to no visibility or control regarding network and data usage, but with a Zero Trust Architecture,

Introduce of Zero Trust Architecture for IT Security

The organization that need to reliably prevent the exfiltration of sensitive data and want to improve their system to defend again modern cyber threats can consider a Zero Trust architecture. This Zero Trust is introduced by analyst firm Forrester Research that alternative architecture for IT security. So Zero Trust, Zero Trust Network or Zero Trust

Benefits of Zero Trust for Business and Security

The organization today operates differently a few years ago. Organizations are increasingly turning away from solutions that secure the perimeter and then trust everything inside and are instead moving to a zero trust security model to protect sensitive resources and data. Under the assumption that a Zero Trust solution dynamically and continually assesses trust every