Posted in Information Security

MITRE ATT&CK Knowledge

Some people will have an urge to know what is MITRE ATT&CK all about and what those methods can do within the cybersecurity field. Let’s…

Continue Reading...
Posted in Information Security

Importance of Security in Domain Name

Nowadays, a lot of organizations create a Domain Name for their website and internal usage. It considered as important to the organization to ensure the…

Continue Reading...
Posted in Information Security

CyberSecurity Experience

In this post, I would like to share the CyberSecurity Experiences that I gained while exploring those fields such as SOC analyst, Forensic analyst, and…

Continue Reading...
Posted in Information Security

Security Standards

What is Cyber Security Standards? When talking about Cybersecurity Standards, a lot of people out there will think only ISO standards which will cover the…

Continue Reading...
Posted in Information Security

Threat Hunting vs Threat Intelligence

Threat Hunting Threat hunting can be labeled as a process that looking for any bad actors on the network connection actively. Threat hunting will be…

Continue Reading...
Posted in Information Security

Cyber Security Framework

Introduction Cybersecurity Framework is a framework that will be based on existing global standards, guidelines and practices for any organization to improve their managing global…

Continue Reading...
Posted in Information Security

Machine Language IA-32 Assembly

Machine Language is a must knowledge that IT-related staff learns during their studies era. Malware Researcher can be considered as one of the fields that…

Continue Reading...
Posted in Information Security

Zero-Trust is a new security paradigm

Due to the situation that occurs right now, all organizations will need to implement a new security model such as Zero-Trust. For those who are…

Continue Reading...
Posted in Information Security Tutorial

Policies that organization should implement

When talking about policies that the organization should be implemented would differ from each other. However, some organization will need to put some effort into…

Continue Reading...
Posted in Information Security

Security Guideline for System and Machine

Security Baseline can be considered as one of the important checklists that needed to ensure the system and application been secured from been compromised. A…

Continue Reading...