Posted in Information Security

Importance of Security in Domain Name

Nowadays, a lot of organizations create a Domain Name for…

Continue Reading...
Posted in Information Security

CyberSecurity Experience

In this post, I would like to share the CyberSecurity…

Continue Reading...
Posted in Information Security

Security Standards

What is Cyber Security Standards? When talking about Cybersecurity Standards,…

Continue Reading...
Posted in Information Security

Threat Hunting vs Threat Intelligence

Threat Hunting Threat hunting can be labeled as a process…

Continue Reading...
Posted in Penetration Testing

Vulnerabilities Assessment vs Penetration Testing

In this post, I would like to share the difference…

Continue Reading...
Posted in Information Security

Cyber Security Framework

Introduction Cybersecurity Framework is a framework that will be based…

Continue Reading...
Posted in Mobile

PhoneSploit Android Mobile Debug Tool

PhoneSploit is a new tool that would be exploiting Android…

Continue Reading...
Posted in Information Security

Machine Language IA-32 Assembly

Machine Language is a must knowledge that IT-related staff learns…

Continue Reading...
Posted in Information Security

Zero-Trust is a new security paradigm

Due to the situation that occurs right now, all organizations…

Continue Reading...
Posted in Information Security Tutorial

Policies that organization should implement

When talking about policies that the organization should be implemented…

Continue Reading...