FORGOT YOUR DETAILS?

The new normal follows with the next normal catch whole world in surprise, and it seems this will continue for a while. All countries to some extent restructured the various sizes of the sector, industry, institutions and resources. The business that is falling, downsizing can not be instant to build back for institutions. For the

Last week’s Beirut explosion incident that happened in Lebanon shocked the world news. Near the capital of Lebanon, the port area of Beirut is completely wiped out due to the extensive explosive material that is being put in the warehouse here for over four (4) years without any actions being taken. Just like other mega

We all know digital transformation is not a choice, it is mandatory if the company wants to be kept relevant and survive in the digital economy. You like it or not, despite you are not in the high tech sector or industry, digital transformation remains relevant, the company capability to vertical or horizontal integration or

The era of new and next normal after COVID-19, whatever term you want to use it, we saw how the majority of big corporations across sectors and industry encounter financial difficulty, due to economic activity will take longer time than usual for the human kind to recover to the pre COVID-19 era. As the second

5 Technology Trends In The Travel And Tourism Industry 2018

For most of the people who plan and attempt to travel this year, or at year end, maybe to next year will be all impacted by the new normal. This massive COVID-19 virus outbreak and the post fear caused by it, continue to make people postpone or cancel for the original intent. The disruption impact

COVID-19 not just changed consumer behaviour but also business behaviour in various extent, as business adapted to the new normal for the post COVD-19 era. It is not yet over, but for most of the business is to learn the lesson and know how to cope with the “new normal” reality that as a result

Let's get real for new normal after COVID-19

New Normal as the new term the world is using for post COVID-19 world. Do not get it wrong, it is not business as usual like before COVID-19. The world is undergoing dramatically change, it challenge most of the sectors and attempt to recover from this world depression (indeed, it not like most of people

Apple WWDC 2020, or 2020 Apple Worldwide Developers Conference took place two days ago, a statement will transit toward ARM Based Mac. Due to COVID-19 pandemic, it became a virtual conference. The 18 announcement is being made but I think the most worth to note is not the rest of the product continuous update release

Application Security Testing AST is a modern term we used to describe various tools based on various technologies used for performing application security testing (AST). Since the product technology keeps advancing, more and more related technology is either consolidated, retired, replaced and being positioned as matured, declined or treated as new emerging technology. The market

ISO 27001 Information Security Management System (ISMS) system and compliance training is one of the key result areas (KRA) for regulatory compliance. Since cybersecurity attack, breach and compromise immediate bring in big business risk, the financial impact of it can put you out of business. For instance, failing to meet the General Data Protection Regulations

World keeps changing in the speed of light under the modern digital economy. What the past success practice and learning may not be adequate to ensure future relevancy. As such, ongoing industry and professional certification provides a means to benchmark for both employer and employee they are sharpening their skills and make their company capability

Post Archive (New to Old)

Protect What is Critical to Your Infrastructure. Government and businesses often view the world through separate lenses. The list of that deemed ‘critical’ in the public sector, although complexly inter-related, is far from a mirror image of the infrastructure concerns of private businesses. In the matter of fact, unless it is global fortune 500 scale corporation,
Cybersecurity Automation and Integration

Cybersecurity Automation and Integration

Cybersecurity Automation and Integration is keyword for what moving for next decade. After few decade of IT evolution, from IT security to modern cyber security, from traditional vulnerability management, like assess and determine vulnerability and likely risk for IT asset (such as networks, end points, application) to modern cyber exposure management, to advise likely cyber

How Zigbee Impact the World

How Zigbee Impact the World, a noted wireless security expert once said,”No wireless technology has been more integrated or impacts the physical world more than Zigbee.” Zigbee Alliance, a group of companies that maintain and publish the Zigbee standard is the leading expert in Internet of Things (IoT). IoT help user to communicate with the
Tagged under: ,

Attacks Against Zigbee

Today we going to discuss about attacks that can happen against Zigbee. Nowadays, technology is developing rapidly from time to time. Even the technology changing so fast it still face threat; physically or virtually from outsider. Despite using encryption AES 128 standard, which is also used by governments and banks but there is no network
A Continuous Intelligence (CI) framework starts with the process of acquiring data and, with the help of analytics and machine learning (ML), derive insights from it to be able to make confident decisions and actions which are in turn reviewed and validated, to ensure the organisation continuously improves its decision-making capabilities, for decision support. Building

Zigbee Network Topology

Network topology is the design of the elements such as links or nodes of a communication network. It can be used to illustrate various types of telecommunication networks. We already talk briefly about one of the three Zigbee network topology in previous post. Now let dive in a little deeper about all three Zigbee network
Tagged under:
From those who had watch Apple’s Worldwide Developers Conference (WWDC) 2019 event, will note that one of the service Apple will launch is the Apple Card. No sure how other is watch for along the transition from Apple from hardware, software and service digital transformation (DT). But for this Apple Card, it go beyond Apple
Tagged under:
If you owned a smart home, you probably stumble the word Zigbee or Z-Wave when you purchased some of your home appliance. We already discussed a little bit about Zigbee. Now the question is what is Z-Wave? We will discuss some key categories between this two smart home standards. Both Zigbee and Z-Wave operate on

Zigbee: The Introduction

What is ZigBee? The name refers to the waggle dance of honey bees after their return to the beehive. ZigBee is an open global standard for wireless technology invented to use energy-saving digital radio signals for personal area networks (PAN). It was created in 1998, standardized in 2003, and revised in 2006. It also designed
Tagged under:
Trustworthy network performance is crucial for enterprises and service providers. Some problem can threaten user experience such as a configuration errors, network or application faults and also security attacks. Engineers need to keep an eye on regularly their networks and quickly troubleshoot problems wherever they occur to make sure the network operating excellently.This enterprises and
TOP