Posted in Information Security

Cyber Security Framework

Introduction Cybersecurity Framework is a framework that will be based…

Continue Reading...
Posted in Information Security

Machine Language IA-32 Assembly

Machine Language is a must knowledge that IT-related staff learns…

Continue Reading...
Posted in Information Security

Zero-Trust is a new security paradigm

Due to the situation that occurs right now, all organizations…

Continue Reading...
Posted in Information Security Tutorial

Policies that organization should implement

When talking about policies that the organization should be implemented…

Continue Reading...
Posted in Information Security

Security Guideline for System and Machine

Security Baseline can be considered as one of the important…

Continue Reading...
Posted in Information Security

Vulnerabilities in Encapsulation

Encapsulation as people might have aware is a programming statement…

Continue Reading...
Posted in Information Security

Yara Tools Usage

Malware Researchers will use the tool YARA in terms of…

Continue Reading...
Posted in Information Security

Data Breach Assessment

What is Data Breach? Nowadays, there is a lot of…

Continue Reading...
Posted in Information Security

Google Dork

Google Dork can be considered as one of the traditional…

Continue Reading...
Posted in Information Security

Cryptography Review

Those who are working in IT department, they sure aware…

Continue Reading...