FORGOT YOUR DETAILS?

Digital Transformation in hotel sector played an important role on how to be successful in this industry that is increasingly competitive and where customer experience and reviews is strongly related. Their reviews based on their experience can be delightful or disastrous for a brand, it is a must to make sure guests are delighted and

Thomas Cook bankruptcy alert old may-not survive under new market

Thomas Cook bankruptcy alert old may-not survive under new market, management failing to bring digital transformation for new market reality. This is the conclusion made base on  current headline for travel news is about long established 178-year-old travel company and airline company declared bankruptcy, on 23 Sep 2019, after failing to reach a last rescue

As the world keeps moving toward digital economy, so do traditional global payment business that used to be controlled by traditional players and now being challenged by non traditional competitors. With the use of big data, blockchain and AI, focus on the effective and efficient online channel to serve the global market at large is

Google Way for Digital Transformation

Company rise and company falls as you can observed from the history. We had just saw Samsung release their mobile Note 10, follow with recent Apple release iPhone 11 Pro. The whole world is eye on Google update event in October. Basically new modern phone standard is triple or quad camera len, 5G depend on

Protect What is Critical to Your Infrastructure. Government and businesses often view the world through separate lenses. The list of that deemed ‘critical’ in the public sector, although complexly inter-related, is far from a mirror image of the infrastructure concerns of private businesses. In the matter of fact, unless it is global fortune 500 scale corporation,

Cybersecurity Automation and Integration

Cybersecurity Automation and Integration is keyword for what moving for next decade. After few decade of IT evolution, from IT security to modern cyber security, from traditional vulnerability management, like assess and determine vulnerability and likely risk for IT asset (such as networks, end points, application) to modern cyber exposure management, to advise likely cyber

How Zigbee Impact the World, a noted wireless security expert once said,”No wireless technology has been more integrated or impacts the physical world more than Zigbee.” Zigbee Alliance, a group of companies that maintain and publish the Zigbee standard is the leading expert in Internet of Things (IoT). IoT help user to communicate with the

Today we going to discuss about attacks that can happen against Zigbee. Nowadays, technology is developing rapidly from time to time. Even the technology changing so fast it still face threat; physically or virtually from outsider. Despite using encryption AES 128 standard, which is also used by governments and banks but there is no network

A Continuous Intelligence (CI) framework starts with the process of acquiring data and, with the help of analytics and machine learning (ML), derive insights from it to be able to make confident decisions and actions which are in turn reviewed and validated, to ensure the organisation continuously improves its decision-making capabilities, for decision support. If

Network topology is the design of the elements such as links or nodes of a communication network. It can be used to illustrate various types of telecommunication networks. We already talk briefly about one of the three Zigbee network topology in previous post. Now let dive in a little deeper about all three Zigbee network

From those who had watch Apple’s Worldwide Developers Conference (WWDC) 2019 event, will note that one of the service Apple will launch is the Apple Card. No sure how other is watch for along the transition from Apple from hardware, software and service digital transformation (DT). But for this Apple Card, it go beyond Apple

Post Archive (New to Old)

From those who had watch Apple’s Worldwide Developers Conference (WWDC) 2019 event, will note that one of the service Apple will launch is the Apple Card. No sure how other is watch for along the transition from Apple from hardware, software and service digital transformation (DT). But for this Apple Card, it go beyond Apple
Tagged under:
If you owned a smart home, you probably stumble the word Zigbee or Z-Wave when you purchased some of your home appliance. We already discussed a little bit about Zigbee. Now the question is what is Z-Wave? We will discuss some key categories between this two smart home standards. Both Zigbee and Z-Wave operate on

Zigbee: The Introduction

What is ZigBee? The name refers to the waggle dance of honey bees after their return to the beehive. ZigBee is an open global standard for wireless technology invented to use energy-saving digital radio signals for personal area networks (PAN). It was created in 1998, standardized in 2003, and revised in 2006. It also designed
Tagged under:
Trustworthy network performance is crucial for enterprises and service providers. Some problem can threaten user experience such as a configuration errors, network or application faults and also security attacks. Engineers need to keep an eye on regularly their networks and quickly troubleshoot problems wherever they occur to make sure the network operating excellently.This enterprises and

Cloud Security Governance

What is cloud computing? Cloud computing is using the Internet (the cloud) to store, manage and process data rather than using the personal computer or local server. When using the cloud as a the storage of course the data are expose to the cyber risk. Security Governance also play an important role to prevent this

Security Governance Framework

As been mention before, in security governance board members in the organisation accountable. It mean board members has the responsibility on their company security governance to prevent from cyber risk. Even though the board member has the authority to perform the information security but they lack in understanding the security issue. To have clear-cut insight
IoT-becoming-IoMT-Internet-Of-Medical-Things
MedPack Exploitation Pack for CANVAS. Due to the product continuous update in nature, so we prepare this post for those who interest to know what is include inside. Latest update will be show on the top, while older update will be auto show below. This post will keep update and the post date will follow

The Rise of Smart Spaces

The Rise of Smart Spaces is global phenomena, it keep rise in the global scale to improve personal and professional productivity, increase energy efficiency, simplify complex processes, and potentially make daily work life easier and less stressful for employee. World shifted toward digital economy and all sectors and industries is struggle to make their own

CIA Triad in Security Governance

How to identify security policies problem area? How to quick fix information security from cyber threat? In this case we used what known as CIA Triad. Don’t get confuse with Central Intelligence Agency; a U.S. government agency that maintain national security from around the world. This CIA can be describe as security model that determine
AI take over IT job
When you open news and read it, you will notice for overall trend of “downsizing”, or close down branches, relocated core process into low cost countries. It first reaction for traditional business management, if you can not generate more revenue, then the better option is to bring down the cost of operating, that involved downsizing
Tagged under:
TOP