Superapps is rising and expected to become prevalent in the future. From mobile banking, e-commerce, food delivery, to booking hotels and public transports, superapps features and functionalities make multiple services accessible from a single source. All you need is your smartphone, internet connection and an installed superapps. Advantageous as it seems, superapps actually appears as
Additive manufacturing is on the rise and its adoption is predicted to become prevalent in the future. Its application no longer revolves around manufacturing industries but had expanded to education, aerospace, medical sectors, and sport industries. Like any other implementation of new technology, additive manufacturing had it challenges and one of it being security issues.
Connective technologies are now no longer a trend in modern cars but had become the essential part in automotive industry. Significantly, in transportation industry, commercial vehicles such as trucks, lorries, vans and tractors are used to deliver products across the states and countries and thus being equipped with connective technologies helps enhance fleet efficiencies, streamline
Believe it or not, automotive hacking is not recent in cyber security. While we are labeling automotive hacking as a rising cyber risk issue in the recent years these days, it is in fact had happened since 2005 and continues to grow over the years as manufacturers constantly adding smart features into their vehicles. Subsequently,
Technology had continuously evolved for the betterment of life. Among the evolution includes the introduction of connected vehicle technology – A technology that allows vehicle to connect to the internet via WLAN, making users to be able to use the internet in their vehicles as well as share data with any external device or services.
E-SPIN Group celebrates its 17th anniversary this November 2022. As a way to say thank you for business and support from the enterprise customers and business partners, E-SPIN is organizing a full day seminar “The Future of Cybersecurity changes and challenges”, under the theme, featuring industry experts and subject matter specialists to perform the various
From Cyber threat intelligence to Threat intelligence feed, both carry some similarity but are two different things, despite both fall under the threat intelligence domain, where most of the people do not understand it clearly. We use the post to help open and clarify both. Cyber Threat Intelligence (CTI) , or mostly will be shortened
With so much hype about passwordless authentication nowadays, it is undeniable that passwordless authentication will succeed the future of authentication method. Passwordless authentication, as the name suggest, is a method that does not require password or answering security questions to gain access to any application or IT system. It offers a lot of benefits to
Many services and applications had begun to apply passwordless authentication, an authentication method that dismisses the use of passwords. The importance of Passwordless authentication has been increasing rapidly in this recent years. Hence, the hype that revolves around passwordless authentication had brought many opinions on the method, in which some may be misinterpreted. This post
Authentication is an essential step in cybersecurity. In the recent years, passwordless authentication as an authentication method has become critically important as cyber attacks continues to evolve due to various adoption of technologies and practice into the IT infrastructure. The importance of passwordless authentication had also been highlighted by trusted research and advisory firms like