FORGOT YOUR DETAILS?

Emerging Technologies That Change the World Forever SOLUTIONS PRODUCTS 5 huge benefit of digital transformation Digital Transformation Business Model Innovation & Value Creation SOLUTIONS PRODUCTS DevSecOps VSM CI/CD, DevSecOps to Value Stream Mapping (VSM) SOLUTIONS PRODUCTS Modern IT Infrastructure ITIM, ITOM, ITSM, NPMD, APM to AIOps/DigiOps SOLUTIONS PRODUCTS Artificial Intelligence (AI) Machine Learning, Deep Learning & Cognitive Computing SOLUTIONS PRODUCTS Intelligence Things Internet of Things (IoT), Digital Twins SOLUTIONS PRODUCTS Software-Defined Everything Software-Defined Security, Networking, Storage SOLUTIONS PRODUCTS Cloud & Edge Computing Cloud Computing | Edge Computing SOLUTIONS PRODUCTS Blockchain Cryptocurrency & Supply Chain Fraud Prevention SOLUTIONS PRODUCTS Reality Technology Virtual, Augmented & Mixed Reality (VR/AR/MR) SOLUTIONS PRODUCTS Modern Workplace Smart Space & Smart Buildings SOLUTIONS PRODUCTS

National Cyber Security Policy (NCSP) is a by-product of the national level to carry out the National Cyber Security Strategy that is based on strategy intent to be in, from current where they are, and level up from where the national are. In execution, we keep saw lot of countries attempt to “smart copy” from

In our time, industrial and critical infrastructures are adopting Internet of Thing (IoT) at an unprecedented rate. While digital transformation in operational technology (OT) can optimise production, drive innovation and increase efficiency, it is not without the risk of increasing cyber threat. Without a proper OT cyber security, our OT device is highly exposed to

Take Care in Handling the Results of Your Web Application Testing

What is the risk of Internet of Behaviour (IoB)? An article released by Gartner, in October 2020, stated that “IoB does have ethical and societal implications depending on the goals and outcomes of individual uses”. Therefore, while the IoB has been recognised its contribution especially in business and healthcare, its risk should not be disregarded.

The cyber attack kill chain is a series of steps that trace stages of a cyberattack from the early reconnaissance stages to the exfiltration of data. The kill chain helps us understand and combat ransomware, security breaches, red-teaming attack lifecycle and advanced persistent attacks (APTs). In brief, Cyber attack kill chain involves several core stages,

What is Computer Network Defense? Computer Network Defense (CND) is a set of procedure and securing measures that use computer networks to detect, monitor, protect, analyze and defend against network infiltration resulting in service or network denial, degradation and disruptions. CND will acknowledge against an unauthorized activity, for instance within the Department of Defense (DoD)

E-SPIN Integrated Cyber Security Center Facility

World had moving toward digitalization and replace traditional industry and sector, digital economy become mainstream worldwide. From corporate and e-government digital transformation (DT),  it become one of the mission critical infrastructure (MCI) regardless of country size, all will invest heavily to make sure at the national level maintain competitiveness in this national core competency. To

Lists of Major Myths in Zero Trust Architecture

Zero trust architecture is focused on what the business needs and to be functionally in organization systems by implementing network-centric date security that provides access to the only person who needs it. In a legacy network, organizations have little to no visibility or control regarding network and data usage, but with a Zero Trust Architecture,

Introduce of Zero Trust Architecture for IT Security

The organization that need to reliably prevent the exfiltration of sensitive data and want to improve their system to defend again modern cyber threats can consider a Zero Trust architecture. This Zero Trust is introduced by analyst firm Forrester Research that alternative architecture for IT security. So Zero Trust, Zero Trust Network or Zero Trust

Benefits of Zero Trust for Business and Security

The organization today operates differently a few years ago. Organizations are increasingly turning away from solutions that secure the perimeter and then trust everything inside and are instead moving to a zero trust security model to protect sensitive resources and data. Under the assumption that a Zero Trust solution dynamically and continually assesses trust every

E-SPIN please to announce for the following latest round of the Immunity CANVAS and SILICA, CANVAS Exploitation Pack update and upgrade for the following related product lines compiled from the various technical resources for easy reading in one go: D2 Elliot Web Exploitation Framework 1.14, August 7 2018 D2 Elliot has been updated with 11

E-SPIN today proudly announce a Free Technology and Solution Requirement Consultancy Services for up to 5 Man Days for per Reseller Partner or End Client Engagement Case to complement ImmuneSecurity SIEM Product - LogInspect for First Quarter in 2013.

Before we can start talking about the concept of cyber business intelligence, we need to understand where IT factors in when BI is in question. Well, it is an integral part of it. In most companies, it is the IT department that is first tasked with collecting data and analyzing it. This is perfectly natural.

TOP