Today's Industry

Vaccine Covax-19

Thursday, September 03 2020 - 16:05 IWST

$1m for Covax-19 vaccine work

The $1 million grant is one of 13 early stage biomedical projects to receive funding through the Federal Government’s Biomedical Translation Bridge (BTB) program, part of Australia’s landmark…

Jonathan Knudsen - Senior Security Strategist, Synopsys Software Integrity Group

Wednesday, September 02 2020 - 15:50 IWST

How to Cyber Security: Pain in the AST

Language is tricky, especially in areas where it is evolving quickly. Software security is a young and volatile field where new terminology ebbs and flows continually.

Ilustration Palm Oil (RSPO)

Friday, August 21 2020 - 20:05 IWST

Shared Responsibility Boosts Sustainable Palm Oil Absorption In Indonesia

The Roundtable on Sustainable Palm Oil (RSPO) has been upholding the shared responsibility concept after its adoption in the 15th General Assembly in 2018.

HackerOne (Images by Tekno Tempo.co)

Wednesday, August 19 2020 - 16:50 IWST

COVID-19 puts CISOs under strain: 21% of Businesses In Singapore Have Seen More Attacks During The Pandemic

HackerOne, the world’s trusted hacker-powered security platform, today revealed research that 21% of businesses in Singapore have seen an increase in attacks on their IT systems as a result…

HIMA's HIQuad X safety systems (Photo by HIMA)

Wednesday, August 12 2020 - 14:45 IWST

Australia's Nickel West Modernized with HIMA’s HIQuad X Safety Systems

Nickel West, a fully integrated mine-to-market nickel producer, part of one of the world's leading producers of major commodities BHP in Australia

Check Point Software Technologies (Images by Acclaim)

Wednesday, August 12 2020 - 14:15 IWST

July 2020’s Most Wanted Malware: Emotet Strikes Again After Five-Month Absence

Researchers found that after a five-month absence, Emotet has surged back to 1st place in the Index, impacting 5% of organisations globally.

Check Point Software Technologies (Images by Acclaim)

Wednesday, August 12 2020 - 13:45 IWST

Check Point’s 2020 Cloud Security Report Highlights Enterprise Security Concerns and Challenges in Public Clouds

The report shows that public cloud security continues to be a major challenge: 75% of respondents stated they were ‘very concerned’ or ‘extremely concerned’ about it.

Taylor Armerding, Software Security Expert at Synopsys Software Integrity Group (Photo by Linkedin)

Wednesday, August 12 2020 - 13:15 IWST

Security Bugs and Flaws: Both Bad, But in Different Ways

That should be self-evident. Given that millions of lines of software code are written by thousands of humans all working under pressure, it is inevitable that they would be littered with different…

Rena Chua, Bug Bounty Advisor at HackerOne (Photo by Linkedin)

Thursday, August 06 2020 - 18:15 IWST

Securing More with Less — How to Maximise Security Coverage while Reducing Costs Usings Hacker-Powered Security

Remember those days, pre-pandemic, when you thought your security scope was complex? But now, with employees working from home, new video and collaboration apps being rolled into daily workflows,…

Trisha Paine, Head of Cloud Marketing Programs, at Check Point Software Technologies

Thursday, August 06 2020 - 17:30 IWST

Striving to Achieve High Fidelity Cloud Security

Several attributes make posture management a particularly challenging component of maintaining cloud security. For starters, you cannot secure or scale a rapidly growing quantity and variety…

Luke Tucker, Senior Director of Community at HackerOne (Photo by Linkedin)

Wednesday, August 05 2020 - 22:00 IWST

Security Engineers by Day, Hackers by Night – An Interview with Two of Singapore’s Top Ethical Hackers

Over the years, the perception of the term “hacker” has changed. Once seen as only criminals, there are now over 800,000 registered security professionals on HackerOne, the world’s trusted…

Patrick Carey, Director of Product Marketing, Synopsys (Photo by Linkedin)

Wednesday, August 05 2020 - 21:45 IWST

Developers are Not Security Experts, but They can be with The Right Tools

Software has revolutionised the way in which we work, live and play. This is particularly true in the realm of software security, as development teams are releasing code faster than ever before.

Darrell Adams, Head of Southeast Asia & Oceania, Universal Robots (Photo by LinkedIn)

Wednesday, August 05 2020 - 21:25 IWST

5 Reasons Why You Need Collaborative Automation For Today's World

The benefits of collaborative automation are undisputed – more profitability, productivity, flexibility, higher quality and even more employee satisfaction.

Friedhelm Best - Vice President Asia Pacific, HIMA (Photo by HIMA)

Wednesday, August 05 2020 - 21:10 IWST

3 Essential Considerations When Modernizing the Safety System of Industrial Facilities

As countries in Asia start to ease restrictions and more businesses return to operation in the midst of the COVID-19 pandemic, industrial plant operators are strategising a return to normality…

Gil Yankovitch, Firmware Technology Lead and Ram Yonish, Firmware Security Evangelist (former co-founders of Cymplify Security, acquired by Check Point) (Photo by LinkedIn)

Wednesday, August 05 2020 - 21:00 IWST

While IoT security standards lag, IoT security companies innovate – Overview of trends in IoT cyber security

While IoT and OT devices proliferate, IoT security standards and regulations are few and far between. Unsurprisingly, this puts individuals, enterprises and states at major risk.

Ilustration Brand phishing (Photo by Technonlogy For You)

Tuesday, August 04 2020 - 09:15 IWST

Google and Amazon Overtake Apple as Most Imitated Brands for Phishing in Q2 2020

Brand phishing involves the attacker imitating an official website of a known brand by using a similar domain or URL, and usually a web page similar to the original website.

more