HorangiMenjawab Pertanyaan Terbesar Tentang RansomwareSerangan Ransomware terus meningkat di tahun 2019. Menurut Trend Micro, pada paruh pertama tahun 2019 terjadi peningkatan 77% dalam…Jan 28, 2022Jan 28, 2022
HorangiDemystifying CASB, CSPM, CWPP For Your Organization’s Cloud SecurityIn the fast-growing focus that organizations have on cloud security strategy, three categories stand above the rest — CASB, CSPM, and CWPP…Jan 21, 2022Jan 21, 2022
HorangiWhat is Cloud Vulnerability Management and Why is it Essential for Cloud Security?With organizations increasingly shifting their workloads onto the public cloud (GCP, AWS, Azure, or Alibaba Cloud), security processes have…Jan 19, 2022Jan 19, 2022
HorangiWhat Is Vulnerability Assessment?Vulnerability Assessment (VA), not to be confused with the Vulnerability Management process, is the activity of discovering and identifying…Jan 7, 2022Jan 7, 2022
HorangiThis is How You can Prevent Log4J2 VulnerabilityBy now, you would have heard of the Apache Log4j2 vulnerability that is in the wild all over the world, with the potential to wreak havoc…Jan 5, 2022Jan 5, 2022
HorangiLakukan Hal Ini Terhadap Infrastruktur Anda Sebelum LiburanSaat ini banyak perusahaan dihadapkan dengan tantangan baru yaitu perubahan pola kerja karyawan karena situasi COVID-19. Di samping itu…Dec 17, 2021Dec 17, 2021
HorangiLakukan Hal Ini Terhadap Infrastruktur Anda Sebelum LiburanSaat ini banyak perusahaan dihadapkan dengan tantangan baru yaitu perubahan pola kerja karyawan karena situasi COVID-19. Di samping itu…Dec 10, 2021Dec 10, 2021
Horangi7 Cloud Computing Security Threats To Watch ForCloud computing provides users the convenience to spin up workloads without dealing with the overhead that comes with maintaining physical…Dec 8, 2021Dec 8, 2021
HorangiTerapkan 8 Langkah Sederhana Ini untuk Amankan Perangkat Android Anda dari HackerZaman sekarang, telepon pintar berbasis Android sudah menjadi barang yang lumrah dan dimiliki siapa saja. Meski berlabel “pintar”, keamanan…Dec 3, 2021Dec 3, 2021