Connective technologies are now no longer a trend in modern cars but had become the essential part in automotive industry. Significantly, in transportation industry, commercial vehicles such as trucks, lorries, vans and tractors are used to deliver products across the states and countries and thus being equipped with connective technologies helps enhance fleet efficiencies, streamline
Believe it or not, automotive hacking is not recent in cyber security. While we are labeling automotive hacking as a rising cyber risk issue in the recent years these days, it is in fact had happened since 2005 and continues to grow over the years as manufacturers constantly adding smart features into their vehicles. Subsequently,
Technology had continuously evolved for the betterment of life. Among the evolution includes the introduction of connected vehicle technology – A technology that allows vehicle to connect to the internet via WLAN, making users to be able to use the internet in their vehicles as well as share data with any external device or services.
E-SPIN Group celebrates its 17th anniversary this November 2022. As a way to say thank you for business and support from the enterprise customers and business partners, E-SPIN is organizing a full day seminar “The Future of Cybersecurity changes and challenges”, under the theme, featuring industry experts and subject matter specialists to perform the various
From Cyber threat intelligence to Threat intelligence feed, both carry some similarity but are two different things, despite both fall under the threat intelligence domain, where most of the people do not understand it clearly. We use the post to help open and clarify both. Cyber Threat Intelligence (CTI) , or mostly will be shortened
With so much hype about passwordless authentication nowadays, it is undeniable that passwordless authentication will succeed the future of authentication method. Passwordless authentication, as the name suggest, is a method that does not require password or answering security questions to gain access to any application or IT system. It offers a lot of benefits to
Many services and applications had begun to apply passwordless authentication, an authentication method that dismisses the use of passwords. The importance of Passwordless authentication has been increasing rapidly in this recent years. Hence, the hype that revolves around passwordless authentication had brought many opinions on the method, in which some may be misinterpreted. This post
Authentication is an essential step in cybersecurity. In the recent years, passwordless authentication as an authentication method has become critically important as cyber attacks continues to evolve due to various adoption of technologies and practice into the IT infrastructure. The importance of passwordless authentication had also been highlighted by trusted research and advisory firms like
Digital transformation had brought many impacts to the world we are living today. One of the impact is massive utilisation of internet applications in various daily activities and adoption of IT system in organisations. Until today, password authentication remains as the most implemented authentication method for data security and protection in most applications. Recently, as
The transformation towards cloud native as well as the increase of distributed workforce trend in organisations had changed our environment into the world without boundaries. While these changes significantly improve productivity and the growth of companies, it also brought about a more complex and critical cyber security issues. As a results, organisations need a more