Posted in Information Security

Cyber Security Framework

Introduction Cybersecurity Framework is a framework that will be based on existing global standards, guidelines and practices for any organization to improve their managing global…

Continue Reading...
Posted in Information Security

Machine Language IA-32 Assembly

Machine Language is a must knowledge that IT-related staff learns during their studies era. Malware Researcher can be considered as one of the fields that…

Continue Reading...
Posted in Information Security

Zero-Trust is a new security paradigm

Due to the situation that occurs right now, all organizations will need to implement a new security model such as Zero-Trust. For those who are…

Continue Reading...
Posted in Information Security Tutorial

Policies that organization should implement

When talking about policies that the organization should be implemented would differ from each other. However, some organization will need to put some effort into…

Continue Reading...
Posted in Information Security

Security Guideline for System and Machine

Security Baseline can be considered as one of the important checklists that needed to ensure the system and application been secured from been compromised. A…

Continue Reading...
Posted in Information Security

Vulnerabilities in Encapsulation

Encapsulation as people might have aware is a programming statement that been defined when it wrapping up the data under a single unit code. The…

Continue Reading...
Posted in Information Security

Yara Tools Usage

Malware Researchers will use the tool YARA in terms of helping them to identify and classify any sample of the malware used. Normally, Malware Researchers…

Continue Reading...
Posted in Information Security

Data Breach Assessment

What is Data Breach? Nowadays, there is a lot of Data Breach has been spread throughout the world. Data Breach severity can be considered as…

Continue Reading...
Posted in Information Security

Google Dork

Google Dork can be considered as one of the traditional and old ways of extracting sensitive information from the website such as email addresses and…

Continue Reading...
Posted in Information Security

Cryptography Review

Those who are working in IT department, they sure aware of Cryptography method where nowadays are been used for encryption of the traffic. There are…

Continue Reading...