
Marketing in Motion: Behind the Promotion Strategy Jakarta-Bandung…
Tuesday, October 17 2023 - 11:30 IWST
All News

Tuesday, June 01 2021 - 23:35 IWST
Rising Trends In The Adoption of Collaborative Automation
More factories than ever before now rely on robots to help relieve human workers from tedious and dangerous tasks, ensure product quality with repetitive tasks, and improve overall productivity.…

Monday, May 31 2021 - 15:30 IWST
Securing IoT environments: A key pillar of Industry 4.0
Check Point Software Technologies Business and factory closures, staff being made redundant or furloughed, disrupted working patterns: the pandemic has had a huge impact across the industrial…

Thursday, April 29 2021 - 22:55 IWST
Securing the IoT tsunami
The Internet of Things (IoT) is a reality. Gartner forecasts 25 billion IoT devices by 2021, and other industry sources and analysts predict even larger numbers. Although projections of unprecedented…

Thursday, April 29 2021 - 00:30 IWST
How to cyber security: 5G is not magic
Some wild claims have been made about 5G networking. I’ve heard mention of self-healing factories and smart highway systems.

Thursday, April 22 2021 - 04:12 IWST
What the 2021 OSSRA report tells us about the state of open source in commercial software
The 2021 “Open Source Security and Risk Analysis” (OSSRA) report, produced by the Synopsys Cybersecurity Research Center (CyRC), examines the results of more than 1,500 audits of commercial…

Saturday, April 17 2021 - 01:05 IWST
The WAF Is Dead (and we know who did it)
The past couple of decades has turned the Web Application Firewall (WAF) into a ubiquitous piece of security kit.

Tuesday, April 13 2021 - 17:07 IWST
Don’t be the weak link in your customers’ supply chain security
SolarWinds, which provides system management tools for network and infrastructure monitoring, has an IT performance monitoring system called Orion. Hackers were able to inject malware into an…

Tuesday, April 13 2021 - 16:32 IWST
Bringing Manufacturing Activities Back Home with Collaborative Robots
The automated capabilities introduced by small, lightweight, and extremely versatile cobots make it possible to automate tasks and processes inconceivable with traditional industrial robots.

Saturday, February 06 2021 - 13:00 IWST
Cosmetics Product Development Effect on Marketing Strategy and Consumer Behaviour
They have changed the way they presented the ads, as well as the packaging of cosmetics product they launch.

Wednesday, January 13 2021 - 15:40 IWST
What is the Cost of Poor Software Quality in the U.S.?
And if you doubt its credibility, or that it applies to software, check out the latest report from the Consortium for Information & Software Quality (CISQ), in partnership with Synopsys, “The…

Friday, January 08 2021 - 17:35 IWST
DevSecOps: The good, the bad, and the ugly
DevSecOps is the practice of integrating security into every stage of the DevOps pipeline.

Friday, December 18 2020 - 13:20 IWST
How to Cyber Security: Software Security is Everyone’s Responsibility
Software security is a kind of team project — everyone in the organisation has an impact on security and risk.

Thursday, December 17 2020 - 15:05 IWST
Six Key Findings From The ‘DevSecOps Practices and Open Source Management in 2020’ Report
Synopsys recently released the “DevSecOps Practices and Open Source Management in 2020” report, findings from a survey of 1,500 IT professionals working in cyber security, software development,…

Wednesday, December 16 2020 - 14:45 IWST
Gazing Into The Crystal Ball: A Look at 2021 Software Security Predictions
As profound of an impact as DevOps has had on application security programs and practices in the past few years, the acceleration of cloud adoption during this pandemic year is shifting the…

Tuesday, December 15 2020 - 14:15 IWST
The ‘New Normal’ is Here to Stay for Some Time: New Survey Reveals Organisations’ Security Priorities for 2021 and Beyond
This was highlighted in a new survey that we conducted to learn what organisations’ main security challenges and priorities are for the next two years, and the changes to their security strategies…

Monday, December 14 2020 - 12:40 IWST
The Security Dilemma of IoT Devices and Potential Consequences
The cybersecurity issues that we all live with today and that can be fixed with an app update or something that’s being pushed out may not necessarily be a priority within the executive teams…

Thursday, December 10 2020 - 10:20 IWST
Configure Security Tools for Effective DevSecOps
Cycle (SDLC) there will be bugs and other defects that create security vulnerabilities that hackers can exploit. Addressing those vulnerabilities effectively is called defect management.

Tuesday, December 01 2020 - 06:00 IWST
Leveraging Business Opportunities through the Push-Pull-Moring Model in a COVID-19 World
Utilizing the Push, Pull, Mooring model (PPM) businesses can identify and take advantage of customer dissatisfaction in the marketplace by competitors.