View all Posts

Is there a solution to the hacking problem behind the convenient IoT world?
Is there a solution to the hacking problem behind the convenient IoT world?
Jan 12 2022

The world is getting smarter. As various...

Read More
Drone Misuse: A Threat To Be Reckoned With
Drone Misuse: A Threat To Be Reckoned With
Dec 15 2021

A recent report published by the Department...

Read More
Why the Cyber Security of your business is in the hands of your most frustrated employee
Why the Cyber Security of your business is in the hands of your most frustrated employee
Dec 08 2021

According to a study by Tech News World, more...

Read More
(Part 4) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 4) Key security vulnerabilities in IoT environment and how to effectively counteract them
Nov 29 2021

Welcome to the final instalment, part 4 of our...

Read More
Gen N Brings New Importance to User Authentication in Today’s Hybrid Work Environments
Gen N Brings New Importance to User Authentication in Today’s Hybrid Work Environments
Nov 10 2021

Remote working environments are not...

Read More
(Part 3) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 3) Key security vulnerabilities in IoT environment and how to effectively counteract them
Nov 10 2021

Join me, Charlie Choi, for Part 3 of our Key...

Read More
(Part 2) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 2) Key security vulnerabilities in IoT environment and how to effectively counteract them
Oct 26 2021

Join me, Charlie Choi, as I once again walk...

Read More
(Part 1) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 1) Key security vulnerabilities in IoT environment and how to effectively counteract them
Oct 11 2021

The IoT (Internet of Things) accounts for the...

Read More
Current drone monitoring systems, pros and cons and how to solve them
Current drone monitoring systems, pros and cons and how to solve them
Sep 27 2021

Read More
The three key challenges facing today's Drone industry
The three key challenges facing today's Drone industry
Sep 06 2021

Read More
How does CIAM protect your customer's account information?
How does CIAM protect your customer's account information?
Aug 19 2021

 

Read More
API vs SDK. What’s the difference? It's what you're developing...
API vs SDK. What’s the difference? It's what you're developing...
Aug 02 2021

In today’s rapidly changing business...

Read More
Why should we pay attention to authentication SDKs?
Why should we pay attention to authentication SDKs?
Jul 12 2021

Read More
The era of DIY kits for software development
The era of DIY kits for software development
Jun 17 2021

Read More
swIDch does it again! Making the Cybertech 100 for the second consecutive year
swIDch does it again! Making the Cybertech 100 for the second consecutive year
Jun 08 2021

Read More
IoT IAM is the basis of IoT security
IoT IAM is the basis of IoT security
May 20 2021

Read More
Is 2021 the 'last hurrah' for passwords?
Is 2021 the 'last hurrah' for passwords?
May 05 2021

Read More
ICAM applies the concept of 'Zero Trust'
ICAM applies the concept of 'Zero Trust'
Apr 21 2021

Read More
Why We Should Care About Smart Factory Security
Why We Should Care About Smart Factory Security
Mar 30 2021

Read More
How do we to create a safe smart city without a cyber citadel?
How do we to create a safe smart city without a cyber citadel?
Mar 05 2021

Read More
Does IoT qualify as a core infrastructure in the era of Industry 4.0?
Does IoT qualify as a core infrastructure in the era of Industry 4.0?
Feb 08 2021

Read More
Variables hindering the growth of connected cars that changed the paradigm of transportation
Variables hindering the growth of connected cars that changed the paradigm of transportation
Jan 19 2021

Read More
What is the solution to the current digital key for security, to limit user inconvenience?
What is the solution to the current digital key for security, to limit user inconvenience?
Jan 05 2021

Read More
swIDch, Web Summit 2020 advance to final
swIDch, Web Summit 2020 advance to final
Dec 08 2020

Read More
OTAC tech applied in Indonesian e-wallet App
OTAC tech applied in Indonesian e-wallet App
Mar 04 2020

Read More

Looking to stay up-to-date with our latest news?

Subscribe to our newsletter