How Is Blockchain Transforming Future Landscape of Cyber Security

Blockchain cybersecurity

In today’s day and age, it is fairly likely that you’ll have heard of bitcoin, a relatively recently created digital cryptocurrency. However, it is a little less likely that you will have heard of blockchain technology, although, if this is the case, it will most likely not be that way for long. With the value …

Read moreHow Is Blockchain Transforming Future Landscape of Cyber Security

Predicting and Managing the Threats Through Adaptive Cyber Security

adaptive cyber security

In an age where cyber security threats are an unfortunate everyday fact of life, cyber security systems are consistently being pushed to their limits by the new and evolving methods employed by hackers and others cyber threats. Organizations today are looking for solutions that enable them to predict, prepare and react proactively to the shifting …

Read morePredicting and Managing the Threats Through Adaptive Cyber Security

Ensuring IT/OT Network Security in Critical Infrastructure

Background After a series of high-profile cyber security incidents on critical infrastructures, governments and enterprises of such facilities have taken malwares seriously into considerations. Apparently, the malwares or ransomware over the past couple years, such as Stuxnet, WannaCry and Crash Override, have publically exposed the vulnerability of SCADA Networks or Industrial Control Systems in today’s …

Read moreEnsuring IT/OT Network Security in Critical Infrastructure

Need of proactive IT / OT Security Strategy in Healthcare

Operational Technology or OT security has taken the center stage in the discussion of protecting our critical infrastructures from cyber attacks. With the rise of smart-devices and the Internet of Things, every industry has become ever more connected and integrated. Network-based systems and tools have become ever more common among organizations due to their enhanced …

Read moreNeed of proactive IT / OT Security Strategy in Healthcare

Securing High-Tech Manufacturing From Cyber Attacks

In recent years, the number of industries that have evolved to the point that a large portion of their critical infrastructure are computer-based, networked systems has continued to increase rapidly, meaning more and more industrial systems are vulnerable to cyber attacks. Increased connectivity between systems brings the potential for a multitude of organizational, operational and …

Read moreSecuring High-Tech Manufacturing From Cyber Attacks

Delivering In-train Infotainment with Onboard Passenger Information System

  Background Passengers on-the-go always demand real-time schedule updates and infotainment, and this has driven the widespread deployments of in-train/in-bus PIS (Passenger Information System). The automated PIS delivers audio-visual information such as updated arrival and departure times, potential delays, alternative plans, local weather, news and some entertainment and advertising. Meanwhile, the system must be constantly …

Read moreDelivering In-train Infotainment with Onboard Passenger Information System

Securing Cash-In-Transit with Access Control, Remote Tracking and Video Monitoring

Background Cash-in-transit vans are frequently exposed to high risks of hijacking, heist and violent attacks. In fact, there have been numerous cases that the vehicle is hijacked and results in the casualty of security guards. Since vehicle security and personnel safety are the primary concerns, modern technologies have been adopted to ensure the safety and …

Read moreSecuring Cash-In-Transit with Access Control, Remote Tracking and Video Monitoring

Enabling In-vehicle Control and Real-time Surveillance for Theme Park Shuttle Services

  Background Shuttle services in theme parks have been greatly impacted by the advancements in communication technologies. When passengers are boarding the shuttle buses or trams to different park areas or hotels, they want broadcasted entertainment and multimedia to have the ultimate customer experience. For theme parks to stay competitive, their shuttle services must be …

Read moreEnabling In-vehicle Control and Real-time Surveillance for Theme Park Shuttle Services

Mitigating Sophisticated Cyber Threats with Modularized Next-Generation Firewall

  Background Nowadays most enterprises and organizations have fortified themselves with some network protection measures, such as basic encryptions, anti-virus and web-filtering. However, as cyber attacks are constantly evolving and becoming more innovative than ever, these conventional protections are encountering their limits against the sophisticated cyber intrusions like social engineering, zero day attack and advanced …

Read moreMitigating Sophisticated Cyber Threats with Modularized Next-Generation Firewall

LEC-7230M: Enabling Successful Procurement Management for Sustainable Business Operation

  Introduction Successful procurement management encompasses identifying corporate needs, finding/qualifying goods/services suppliers, requesting proposals, negotiating terms/condition, contracting, delivery and analyzing results. At their most fundamental level such systematic approaches require the use of physical asset management software, robust SFF hardware appliances and services in order to add values, save time/money and streamline business practices that …

Read moreLEC-7230M: Enabling Successful Procurement Management for Sustainable Business Operation