Is Zoom Security Measures Enough to Protect You?

As working from home becomes the new norm in today’s COVID-19 pandemic, video conferencing solutions are utilized to foster communication, collaboration, and to stay connected with all business personnel. One of the most popular video conferencing solutions being used is Zoom. The number of daily users experienced a significant increase, from an average of 10 […]

How Hackers Can Exploit the Buffer Overflow Vulnerability

It is the goal of every hacker to gain access and control one’s IT system. This can be achieved by exploiting existing vulnerabilities, such as a buffer overflow. It occurs when an application tries to write more data to a fixed memory than it is allocated to hold. This will lead to the data being […]

How to Setup Dsiem, a Defenxor Security Event Correlation Engine

Detecting potential issues before they become real problems is very essential in minimizing business risk of data breach or any other security attacks. Especially in today’s business technology situation, where every day there are millions and billions of events that happened on the system. Thus, it is impossible for any human being to manually check […]

Peranan SOC terhadap Peningkatan Keamanan TI Perusahaan

Teknologi informasi (TI) kini memegang peranan besar dalam menunjang kegiatan operasi bisnis di perusahaan. Bahkan, TI sendiri telah menjadi business enabler di mana tanpa adanya TI, suatu bisnis tidak bisa berjalan. Oleh karena itu, keberadaan TI pada suatu perusahaan menjadi begitu krusial, khususnya memasuki era digital saat ini. Di tengah dunia bisnis yang semakin kompetitif […]

Dengan mengisi data pribadi Anda, PT Defender Nusa Semesta dan afiliasinya akan mengumpulkan dan memroses data tersebut. Kebijakan Privasi PT Defender Nusa Semesta.