All News

UR10 cobots in its HMLV manufacturing facility

Tuesday, June 01 2021 - 23:35 IWST

Rising Trends In The Adoption of Collaborative Automation

More factories than ever before now rely on robots to help relieve human workers from tedious and dangerous tasks, ensure product quality with repetitive tasks, and improve overall productivity.…

IOT Security

Monday, May 31 2021 - 15:30 IWST

Securing IoT environments: A key pillar of Industry 4.0

Check Point Software Technologies Business and factory closures, staff being made redundant or furloughed, disrupted working patterns: the pandemic has had a huge impact across the industrial…

Four IoT security challenges

Thursday, April 29 2021 - 22:55 IWST

Securing the IoT tsunami

The Internet of Things (IoT) is a reality. Gartner forecasts 25 billion IoT devices by 2021, and other industry sources and analysts predict even larger numbers. Although projections of unprecedented…

5G networking

Thursday, April 29 2021 - 00:30 IWST

How to cyber security: 5G is not magic

Some wild claims have been made about 5G networking. I’ve heard mention of self-healing factories and smart highway systems.

Synopsys Cybersecurity Research Center (CyRC)

Thursday, April 22 2021 - 04:12 IWST

What the 2021 OSSRA report tells us about the state of open source in commercial software

The 2021 “Open Source Security and Risk Analysis” (OSSRA) report, produced by the Synopsys Cybersecurity Research Center (CyRC), examines the results of more than 1,500 audits of commercial…

Photo: TJ Gonen, Head of Cloud Security Products, Check Point

Saturday, April 17 2021 - 01:05 IWST

The WAF Is Dead (and we know who did it)

The past couple of decades has turned the Web Application Firewall (WAF) into a ubiquitous piece of security kit.

ilustration, chain security (Ist)

Tuesday, April 13 2021 - 17:07 IWST

Don’t be the weak link in your customers’ supply chain security

SolarWinds, which provides system management tools for network and infrastructure monitoring, has an IT performance monitoring system called Orion. Hackers were able to inject malware into an…

Asia-Pacific Universal Robots

Tuesday, April 13 2021 - 16:32 IWST

Bringing Manufacturing Activities Back Home with Collaborative Robots

The automated capabilities introduced by small, lightweight, and extremely versatile cobots make it possible to automate tasks and processes inconceivable with traditional industrial robots.

Rashelia Pasca Dwiton - Student of MM Tech President University Batch 5

Saturday, February 06 2021 - 13:00 IWST

Cosmetics Product Development Effect on Marketing Strategy and Consumer Behaviour

They have changed the way they presented the ads, as well as the packaging of cosmetics product they launch.

Taylor Armerding, Software Security Expert at Synopsys Software Integrity Group (Photo by Linkedin)

Wednesday, January 13 2021 - 15:40 IWST

What is the Cost of Poor Software Quality in the U.S.?

And if you doubt its credibility, or that it applies to software, check out the latest report from the Consortium for Information & Software Quality (CISQ), in partnership with Synopsys, “The…

Nivedita Murthy - Senior Security Consultant, at Synopsys Software Integrity Group

Friday, January 08 2021 - 17:35 IWST

DevSecOps: The good, the bad, and the ugly

DevSecOps is the practice of integrating security into every stage of the DevOps pipeline.

Jonathan Knudsen - Senior Security Strategist, Synopsys Software Integrity Group

Friday, December 18 2020 - 13:20 IWST

How to Cyber Security: Software Security is Everyone’s Responsibility

Software security is a kind of team project — everyone in the organisation has an impact on security and risk.

Fred Bals - Senior technical expert at Synopsys Software Integrity Group (Photo by

Thursday, December 17 2020 - 15:05 IWST

Six Key Findings From The ‘DevSecOps Practices and Open Source Management in 2020’ Report

Synopsys recently released the “DevSecOps Practices and Open Source Management in 2020” report, findings from a survey of 1,500 IT professionals working in cyber security, software development,…

Taylor Armerding, Software Security Expert at Synopsys Software Integrity Group (Photo by Linkedin)

Wednesday, December 16 2020 - 14:45 IWST

Gazing Into The Crystal Ball: A Look at 2021 Software Security Predictions

As profound of an impact as DevOps has had on application security programs and practices in the past few years, the acceleration of cloud adoption during this pandemic year is shifting the…

Sharat Sinha - Vice President/ GM, APAC at Check Point Software Technologies (Photo by CRN India)

Tuesday, December 15 2020 - 14:15 IWST

The ‘New Normal’ is Here to Stay for Some Time: New Survey Reveals Organisations’ Security Priorities for 2021 and Beyond

This was highlighted in a new survey that we conducted to learn what organisations’ main security challenges and priorities are for the next two years, and the changes to their security strategies…

Tim Mackey, Principal Security Strategist, Synopsys Cybersecurity Research Centre (CyRC) (Photo by Synopsys)

Monday, December 14 2020 - 12:40 IWST

The Security Dilemma of IoT Devices and Potential Consequences

The cybersecurity issues that we all live with today and that can be fixed with an app update or something that’s being pushed out may not necessarily be a priority within the executive teams…

Taylor Armerding, Software Security Expert at Synopsys Software Integrity Group (Photo by Linkedin)

Thursday, December 10 2020 - 10:20 IWST

Configure Security Tools for Effective DevSecOps

Cycle (SDLC) there will be bugs and other defects that create security vulnerabilities that hackers can exploit. Addressing those vulnerabilities effectively is called defect management.

Daniel J. Blanchett is an English and Emotional Intelligence lecturer at President University in Cikarang and is currently pursuing a Masters in Management Technology

Tuesday, December 01 2020 - 06:00 IWST

Leveraging Business Opportunities through the Push-Pull-Moring Model in a COVID-19 World

Utilizing the Push, Pull, Mooring model (PPM) businesses can identify and take advantage of customer dissatisfaction in the marketplace by competitors.