FORGOT YOUR DETAILS?

Vulnerability Management explained in E-SPIN Vulnerability Management Wheel model
Why is Continuous Intelligence important? Because IT has historically focused on batch processing, the concept of continuous processing is fairly new to most organizations. Continuous intelligence waits for nothing, not data collection periods, not resource availability, not processing time. It is the nonstop generation of insight and actions based on operational data stores as well
Tagged under:
A Continuous Intelligence (CI) framework starts with the process of acquiring data and, with the help of analytics and machine learning (ML), derive insights from it to be able to make confident decisions and actions which are in turn reviewed and validated, to ensure the organisation continuously improves its decision-making capabilities, for decision support. If

Zigbee Network Topology

Network topology is the design of the elements such as links or nodes of a communication network. It can be used to illustrate various types of telecommunication networks. We already talk briefly about one of the three Zigbee network topology in previous post. Now let dive in a little deeper about all three Zigbee network
Tagged under:
From those who had watch Apple’s Worldwide Developers Conference (WWDC) 2019 event, will note that one of the service Apple will launch is the Apple Card. No sure how other is watch for along the transition from Apple from hardware, software and service digital transformation (DT). But for this Apple Card, it go beyond Apple
Tagged under:
If you owned a smart home, you probably stumble the word Zigbee or Z-Wave when you purchased some of your home appliance. We already discussed a little bit about Zigbee. Now the question is what is Z-Wave? We will discuss some key categories between this two smart home standards. Both Zigbee and Z-Wave operate on

What is Continuous Intelligence?

What is continuous intelligence? And, what does it provide to software development, IT operations and business teams? Continuous intelligence (CI) from all your data is not another phrase to describe real time, speed or throughput. It is a business-saving technique that helps enterprises analyze data in real-time from previous experiences and use it to optimize

Zigbee: The Introduction

What is ZigBee? The name refers to the waggle dance of honey bees after their return to the beehive. ZigBee is an open global standard for wireless technology invented to use energy-saving digital radio signals for personal area networks (PAN). It was created in 1998, standardized in 2003, and revised in 2006. It also designed
Tagged under:

Cloud Security Governance

What is cloud computing? Cloud computing is using the Internet (the cloud) to store, manage and process data rather than using the personal computer or local server. When using the cloud as a the storage of course the data are expose to the cyber risk. Security Governance also play an important role to prevent this

Security Governance Framework

As been mention before, in security governance board members in the organisation accountable. It mean board members has the responsibility on their company security governance to prevent from cyber risk. Even though the board member has the authority to perform the information security but they lack in understanding the security issue. To have clear-cut insight
VMware AirWatch Technical Overview by E-SPIN

Edge AI Computing

What is meant by Edge AI Computing? Edge AI Computing in IT is defined as the deployment of data-handling activities or other network operations away from centralized and always-connected network segments, and toward individual sources of data capture, such as endpoints like laptops, tablets or smartphones. Edge AI Computing deployments are ideally suited in a
Tagged under:

The Rise of Smart Spaces

The Rise of Smart Spaces is global phenomena, it keep rise in the global scale to improve personal and professional productivity, increase energy efficiency, simplify complex processes, and potentially make daily work life easier and less stressful for employee. World shifted toward digital economy and all sectors and industries is struggle to make their own

CIA Triad in Security Governance

How to identify security policies problem area? How to quick fix information security from cyber threat? In this case we used what known as CIA Triad. Don’t get confuse with Central Intelligence Agency; a U.S. government agency that maintain national security from around the world. This CIA can be describe as security model that determine
Security Governance Characteristics
Before, we already discussed on what is security governance or information security in an organisation all about. Today let dive into what are the characteristics or attributes for effective security governance that can be implement in an institution. The first characteristic is leaders or board members are accountable. What does it mean by accountable? Accountable
AI take over IT job
When you open news and read it, you will notice for overall trend of “downsizing”, or close down branches, relocated core process into low cost countries. It first reaction for traditional business management, if you can not generate more revenue, then the better option is to bring down the cost of operating, that involved downsizing
Tagged under:

What is Security Governance?

What is security governance? Basically every company have their own framework of standards, processes and company activities to ensure the whole organisation run smoothly everyday. All this company data and activities must be keep in private and only authorized people can access the data and activities. This is security governance or in other simpler word

Edge Computing in IoT

Edge Computing in IoT. What is edge computing in IoT? Edge computing allows data produced by internet of things (IoT) devices to be processed closer to where it is created instead of sending it across long routes to data centers or clouds. Edge computing is perfect for IoT for three reasons. Firstly because the data is

Edge AI can help in business

Artificial intelligence (AI) impact on business. By deploying the right AI technology, your business may gain an ability to save time, better inventory and delivery management and money by automating routine processes and tasks. Edge AI can help in business make faster business decisions based on outputs from cognitive technologies. Edge AI can help in
For all the executive, their key priority is to develop a killer strategy that make sure the company mobilising all the resources in the right way for the company maintain competitive edge for the future to come. It include digital transformed the company to make sure it align for the modern and future market requirement.
Tagged under:

Edge AI

Edge AI. What means of Edge AI? It allows you to connect in real-time with your customer, no matter what their location is. It also lets real time operations including data creation, decision and action where milliseconds matter. The important of Edge AI. Edge computing is a distributed computing paradigm which brings computer data storage
Tagged under:
Risk of Artificial Intelligence from recent aircraft disaster
Risk of Artificial Intelligence from recent aircraft disaster bring this issue into global headline. From the recent two aircraft disaster from Boeing 737 MAX, within 5 months, the latest and most advanced artificial intelligence (AI) backed aircraft. This trigger the global concern for the AI when use and deploy on the safety first industry and
Tagged under:
E-SPIN Unified Vulnerability Management (UVM) Explained
Since Tom Peter and Robert Waterman written and published In Search of Excellence in 1982. Those large firms with dominant positions in markets that were senescent or static in the past. Then the wave for Good to Great, and now in 2019, after globalisation, internet, digital economy and current digital transformation era. Market size alone
Cognitive Predictive Maintenance (CPdM)
Introduce Of Cognitive Predictive Maintenance (CPdM) in the systems of the organization is not new right now. So what is cognitive predictive maintenance? Cognitive Predictive Maintenance (CPdM) is synonymous with prescriptive maintenance, where computer programs recommend responses to emergent operational deficiencies in order to prevent them from snowballing into full-blown failures. These recommendations are based
Benefits Of Advanced Threat Protection (ATP)
Traditional anti virus and package is dated approach to protect against cyber attack in the modern world. Modern cyber attack leverage multiple attack vectors and techniques that beyond traditional antivirus package protection that work in the past. Modern world is all about leveraging Advanced Threat Protection (ATP). There are many benefits of Advanced Threat Protection
Accelerate government transformations success rate

World’s Top Global Mega Trends 2029

Indeed, that 10 years from now, we begin from the end, in case for those yet to see what the change and impact will be. Mega trends are concept we use for describe global, sustained and macro economic forces of development that impacts business, economy, society, cultures and personal lives thereby defining our future world
SD-WAN architecture is the high-level structure of the software and hardware system that make up the SD-WAN and how it’s deployed. The method of deployment or architecture is often determined by business scale, needs, and associated cost. In the SD-WAN architecture, the high-level structure of the software and hardware system that makes up the SD-Wan
Benefit of network based software defined wan (sd-wan)
Although all networking of all types can benefit from SDN (Software Defined Network), one area ripe for adoption is the wide area network (WAN). SD-Wan, as software-defined WAN is called, can enable businesses to harness virtualization and reap the benefits. Some companies are pushing forward with SD-WAN technology and giving businesses an easy adoption path.
What is Software-Defined WAN (SD-WAN)
SD-WAN or SDWAN also know as the software-defined wide-area network is an application of software-defined networking (SDN) technology applied to WAN connections and It connects enterprise networks including branch offices and data centres also over large geographic distances. A key application of SD-WAN is to allow companies to build higher-performance WANs using lower-cost and commercially
5 Steps To Implement Building Zero Trust Strategy
Many companies are moving to the cloud and, green field environments. Here are 5 steps to implement building Zero Trust strategy that dramatically improves your organization’s security posture: Verify trust upon access to any network resource and do it in real-time. Include assets that are ignored today. Be sure to focus on legacy systems, tools
NoOps (No Operation) is Development and operations that no need to interact with one another to get their job done. It is development relies on self-service infrastructure, continuous integration, and deployment solutions but is only possible through the use of specific software solution. DevOps is Development and operations work together throughout the software development lifecycle
Augmented Analytics Is the future of data and analytics. Augmented analytics or Augmented Intelligence, an approach that automates insight-finding by incorporating natural language processing and machine learning (ML) to create better data preparation method and data findings. This Augmented analytics also makes data easier to understand by presenting completely in sequence and getting clear results,
TOP