Skip to content
+62 21 4250 088 | +62 21 224 21 455info@infosystem.co.id
Wiyarta Infosystem Nusantara
  • Home
  • About Us
    • Profile
    • Work
    • Care
    • Serve
  • Services
    • Operating System Planning and Migration
    • System Planning and Implementation
    • IT Assets Management and Assesment
    • Network Security and Audit
    • Network Monitoring
    • Network Design and Deployment
  • Product
    • Enterprise resource planning (ERP)
    • Digital Signage
    • Attendance System
    • Integrated Network Communication
    • IP Based Surveillance System
    • Special Purpose POS
    • Storage Management System
  • Blog
  • Contact

Month: April 2017

  • Home
  • 2017
  • April
23 Apr 2017

Best Practices for Securing Open Source Code

webmasterNews

Attackers see open source components as an obvious target because there’s so much information on how to exploit them. These best practices will help keep you safer. Source: Best Practices for Securing Open Source Code

Read More
22 Apr 2017

Kill Chain & the Internet of Things

webmasterNews

IoT “things” such as security cameras, smart thermostats and wearables are particularly easy targets for kill chain intruders, but a layered approach to security can help thwart an attack. Source: Kill Chain & the Internet of Things

Read More
Is industrial IoT new or old? It’s a more complex question than you think. If you’ve experienced the advertising barrage of the past decade, you might have concluded that large industrial companies are just discovering the power of data. Source: Industrial IoT: Think of it as a May-December romance
14 Apr 2017

Industrial IoT: Think of it as a May-December romance

webmasterNews

Is industrial IoT new or old? It’s a more complex question than you think. If you’ve experienced the advertising barrage of the past decade, you might have concluded that large industrial companies are just discovering the power of data. Source: Industrial IoT: Think of it as a May-December romance

Read More
2 Apr 2017

Over 85% Of Smart TVs Can Be Hacked Remotely Using Broadcasting Signals

webmasterNews

The Internet-connected devices are growing at an exponential rate, and so are threats to them. Due to the insecure implementation, a majority of Internet-connected embedded devices, including Smart TVs, Refrigerators, Microwaves, Security Cameras, and printers, are routinely being hacked and used as weapons in cyber attacks. Source: Over 85% Of Smart TVs Can Be Hacked Remotely…

Read More

Serach

Recent Posts

  • The Agile Advantage of Container Orchestration Over Plain Virtualization
  • Considerations for Migrating Office Computing Operations to Open Source
  • Understanding Mail Flow Among MailServers
  • Understanding Mail Flow: From Sender to Receiver Inbox
  • Understanding Nextcloud: Benefits Over Traditional NAS and File Sharing Services

Recent Comments

    Archives

    • December 2024
    • June 2021
    • May 2020
    • April 2019
    • January 2019
    • December 2018
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017

    Categories

    • News
    • Uncategorized

    We are on X

    Menu

    • Home
    • About Us
      • Who We Are
    • Services
    • Product
    • Blog
    • Links
      • Presentations
      • Video
      • Short Video
    • Contact

    Categories

    • News
    • Uncategorized

    Recent Posts

    • The Agile Advantage of Container Orchestration Over Plain Virtualization
    • Considerations for Migrating Office Computing Operations to Open Source
    • Understanding Mail Flow Among MailServers
    • Understanding Mail Flow: From Sender to Receiver Inbox

    Office Address


    PT. Wiyarta Infosystem Nusantara

    +62 21 4250 777,
    +62 21 4250 088,
    +62 21 400 11 777

    info@infosystem.co.id
    www.infosystem.co.id
    Grha Wiyarta, Jl. Cempaka Putih Tengah 1 No.5D, Cempaka Putih, Jakarta Pusat

    08:00-20:00 Monday-Friday

    infosystem © all right reserved 2016

    PT. Wiyarta Infosystem Nusantara