Security Advisory - Apache Log4j2 Vulnerability and Mitigation: AccessMatrix version 5.6.5 or later is affected by this vulnerability

Why Should Mobile App Security be a Top Priority for Developers?

Mobile apps carry their own set of vulnerabilities. As developers, you hold the responsibility to step up and think ahead of unintended consequences when it comes to app security, and this includes identifying the common mobile app security threats and how to counter them.

Why Should Mobile App Security be a Top Priority for Developers?2021-12-16T17:23:49+08:00

Cross-Border E-Commerce Product Authentication and Traceability through Unique Product Identity

In recent years, the rapid development of cross-border e-commerce across the globe has brought many conveniences to people's daily lives.

Cross-Border E-Commerce Product Authentication and Traceability through Unique Product Identity2021-12-16T17:37:25+08:00

How Blockchain can build consumers’ confidence in products with product transparency

There’s a growing consensus that blockchain technology is the next step in the digitization of the supply chain, providing......

How Blockchain can build consumers’ confidence in products with product transparency2021-03-16T03:51:53+08:00

Organisations need to re-assess their IAM strategy and tools to support the New Normal

Nowadays, though, enterprises use both on-premise and cloud-based systems and applications. Employees, partners, and clients access these programs through various devices, including personal......

Organisations need to re-assess their IAM strategy and tools to support the New Normal2020-12-31T02:55:03+08:00
Go to Top