Cloud Implementation’s Best Practice that been used around the world
I will share my experience on the Cloud Implementation’s Best Practice and doesn’t applied to any of my previous, current…
Vigilant is my middle name
I will share my experience on the Cloud Implementation’s Best Practice and doesn’t applied to any of my previous, current…
There’s a lot of compromises have been made last year which costs huge damage to the global organizations. The key…
On this post, I would discuss the Red Teaming activity where some organization will be using those team to test…
What is Lateral Movement attack? For those are not familiar with Lateral Movement attack, it normally an attack that related…
I would like to share the knowledge that I gain during my training lately about the Privileged Access Management(PAM) which…
For this post, I would like to share some knowledge that I just recently learn a few days ago. When…
For this post, I would like to share a checklist of Cloud Security Assessment that will cover multiple areas of…
A protocol such as Border Gateway Protocol(BGP) normally used for routing information on Exchange which been work between ISP like…
In an organization, there will be a lot of Cybersecurity leader level and Chief Information Security Officer or also known as CISO…
Nowadays, a lot of organizations and people have implemented Multi-Factor Authentication or also known as MFA on their email, system,…