Posts

COVID-19

How Are Technologies Used to Fight Against COVID-19? How Secure Are They?

Four months into the outbreak, COVID-19 shows no sign of dying…
Smart City

Building Smart Cities From Big Data

Since the introduction of smartphones, the term “smart” has…
Smart Office

Fancy Devices for the Office and Corporate Security

The smart workplace  The internet of things (IoT) has…
iot m2m image

How Will Machine to Machine (M2M) and IoT Change the Future?

M2M is direct communication between devices using any communications…
5G Blog

5G: A Complete Game Changer

The driving forces behind 5G  Wireless cellular transmission…
Healthcare

How Big Data is Transforming the Healthcare Industry

The evolution of healthcare  What comes to mind when…
JAN Week 4_Security Weekly (2)

[Security Weekly] Microsoft Security Breach Exposed Records of 250 Million Customers

4th Week of January 2020   1. Microsoft discloses security…
EV charging

IoT, Connected Car, and ‘Transport Security’

As the IoT technology advances, we start to wonder if the security…
IoT Security Breaches

Top 5 Shocking IoT Security Breaches of 2019

With the continued growth of technologies and IoT devices, the…
Connected World

Ensuring Security for Connected World

 Connectivity is the theme of today’s world. Even…