All News

ilustration, chain security (Ist)

Tuesday, April 13 2021 - 17:07 IWST

Don’t be the weak link in your customers’ supply chain security

SolarWinds, which provides system management tools for network and infrastructure monitoring, has an IT performance monitoring system called Orion. Hackers were able to inject malware into an…

Asia-Pacific Universal Robots

Tuesday, April 13 2021 - 16:32 IWST

Bringing Manufacturing Activities Back Home with Collaborative Robots

The automated capabilities introduced by small, lightweight, and extremely versatile cobots make it possible to automate tasks and processes inconceivable with traditional industrial robots.

Rashelia Pasca Dwiton - Student of MM Tech President University Batch 5

Saturday, February 06 2021 - 13:00 IWST

Cosmetics Product Development Effect on Marketing Strategy and Consumer Behaviour

They have changed the way they presented the ads, as well as the packaging of cosmetics product they launch.

Taylor Armerding, Software Security Expert at Synopsys Software Integrity Group (Photo by Linkedin)

Wednesday, January 13 2021 - 15:40 IWST

What is the Cost of Poor Software Quality in the U.S.?

And if you doubt its credibility, or that it applies to software, check out the latest report from the Consortium for Information & Software Quality (CISQ), in partnership with Synopsys, “The…

Nivedita Murthy - Senior Security Consultant, at Synopsys Software Integrity Group

Friday, January 08 2021 - 17:35 IWST

DevSecOps: The good, the bad, and the ugly

DevSecOps is the practice of integrating security into every stage of the DevOps pipeline.

Jonathan Knudsen - Senior Security Strategist, Synopsys Software Integrity Group

Friday, December 18 2020 - 13:20 IWST

How to Cyber Security: Software Security is Everyone’s Responsibility

Software security is a kind of team project — everyone in the organisation has an impact on security and risk.

Fred Bals - Senior technical expert at Synopsys Software Integrity Group (Photo by

Thursday, December 17 2020 - 15:05 IWST

Six Key Findings From The ‘DevSecOps Practices and Open Source Management in 2020’ Report

Synopsys recently released the “DevSecOps Practices and Open Source Management in 2020” report, findings from a survey of 1,500 IT professionals working in cyber security, software development,…

Taylor Armerding, Software Security Expert at Synopsys Software Integrity Group (Photo by Linkedin)

Wednesday, December 16 2020 - 14:45 IWST

Gazing Into The Crystal Ball: A Look at 2021 Software Security Predictions

As profound of an impact as DevOps has had on application security programs and practices in the past few years, the acceleration of cloud adoption during this pandemic year is shifting the…

Sharat Sinha - Vice President/ GM, APAC at Check Point Software Technologies (Photo by CRN India)

Tuesday, December 15 2020 - 14:15 IWST

The ‘New Normal’ is Here to Stay for Some Time: New Survey Reveals Organisations’ Security Priorities for 2021 and Beyond

This was highlighted in a new survey that we conducted to learn what organisations’ main security challenges and priorities are for the next two years, and the changes to their security strategies…

Tim Mackey, Principal Security Strategist, Synopsys Cybersecurity Research Centre (CyRC) (Photo by Synopsys)

Monday, December 14 2020 - 12:40 IWST

The Security Dilemma of IoT Devices and Potential Consequences

The cybersecurity issues that we all live with today and that can be fixed with an app update or something that’s being pushed out may not necessarily be a priority within the executive teams…

Taylor Armerding, Software Security Expert at Synopsys Software Integrity Group (Photo by Linkedin)

Thursday, December 10 2020 - 10:20 IWST

Configure Security Tools for Effective DevSecOps

Cycle (SDLC) there will be bugs and other defects that create security vulnerabilities that hackers can exploit. Addressing those vulnerabilities effectively is called defect management.

Daniel J. Blanchett is an English and Emotional Intelligence lecturer at President University in Cikarang and is currently pursuing a Masters in Management Technology

Tuesday, December 01 2020 - 06:00 IWST

Leveraging Business Opportunities through the Push-Pull-Moring Model in a COVID-19 World

Utilizing the Push, Pull, Mooring model (PPM) businesses can identify and take advantage of customer dissatisfaction in the marketplace by competitors.

Oleg Mogilevsky - Product Marketing Manager at Check Point Software Technologies (Photo by Linkedin)

Tuesday, November 10 2020 - 11:00 IWST

Five Reasons to Reevaluate Your Endpoint Protection

With the new emerging threats caused by remote working standards, security professionals need to reevaluate their approach to protecting endpoints. In order to do so, it’s vital that organisations…

Darrell Adams, Head of Southeast Asia & Oceania, Universal Robots (Photo by LinkedIn)

Tuesday, November 10 2020 - 10:30 IWST

Collaborative Robots Open New Horizons in Quality Control Processes

Collaborative robots (cobots) offer suitable solutions to manufacturers. Hence, cobot-based quality control and inspection systems that can transition between different end products in very…

Adi Ikan - Network Research & Protection Group Manager, at Check Point Software Technologies (Photo by Linkedin)

Friday, October 30 2020 - 10:05 IWST

Measuring the Global Impact of the NSA’s Top 25 Vulnerabilities Being Exploited In the Wild

NSA’s list of top vulnerabilities were used to launch 3 million attacks in 2020, with 2.5 million of those attacks occurring in the last 6 months.

Ian Hall - Asia-Pacific Client Services Manager, at Synopsys Software Integrity Group

Monday, October 26 2020 - 11:00 IWST

4 Steps for CISOs to Improve Their Organisation’s Application Security Program

Synopsys recently published its annual BSIMM report, created to help organisations plan, execute, measure, and improve their software security initiatives

Friedhelm Best - Vice President Asia Pacific, HIMA (Photo by HIMA)

Friday, October 23 2020 - 14:30 IWST

Farm & Food 4.0: How Technology Is Transforming an Industry

Digitization has affected different industries, and especially now, the food and farming industries as well.

Rena Chua, Bug Bounty Advisor at HackerOne (Photo by Linkedin)

Friday, October 23 2020 - 11:35 IWST

3 Key Problems Security Professionals Have With Traditional Penetration Testing

Based on customer interviews, the study identifies 3 key problems with traditional pentesting solutions and evaluates the benefits of time-bound testing using ethical hackers.