Memahami identity threat dari kasus nyata kebocoran data

Setiap admin IT, tanpa melihat ukuran organisasi ataupun jumlah karyawan di organisasi tersebut, memiliki satu ketakutan yang sama. Ketakutan itu ialah kebocoran data. Data organisasi...

ADManager Plus , Indonesia 2 min read Read

Awas! Apakah data Anda sudah bocor di dark web?

Dark web sering kali terasa seperti dunia bawah tanah yang penuh misteri, bagaikan sebuah sudut tersembunyi di internet tanpa aturan, tempat data curian diperjualbelikan dan...

Indonesia , Log360 2 min read Read

Role-based access control: Lindungi organisasi dari ancaman siber

Di era digital saat ini, ancaman siber semakin marak dan dapat memberikan risiko kebocoran data bagi organisasi, baik di sektor publik maupun swasta. Bahkan, satu...

ADManager Plus , Indonesia 2 min read Read

Access certification berkala mampu mengatasi kebocoran data

Dalam dunia keamanan siber yang terus berkembang, ancaman siber selalu mengintai dan menjadi kekhawatiran utama. Di saat ini, memberi hak akses permanen atau standing privilege...

ADManager Plus , Indonesia 1 min read Read

Dark web leaks: Could your business be the next target?

Imagine this: You’re the head of IT at a mid-sized company. You read about a major corporation that suffered a data breach. Stolen customer data...

General , Log360 2 min read Read

Cegah pencurian data dengan keamanan manajemen izin akses

Industri teknologi berkembang cepat, sama cepatnya seperti serangan siber. Pada laporan IT governance data breach April 2024, industri pendidikan mengalami paling banyak insiden pelanggaran data,...

ADManager Plus , Indonesia 2 min read Read

Top tips: 5 potential use cases of 6G networks

Top tips is a weekly column where we highlight what’s trending in the tech world and list ways to explore these trends. This week, we’ll...

AlarmsOne , DataSecurity Plus , Mobile Device Manager Plus 3 min read Read

Top tips: Integrating biometrics into IAM

Top tips is a weekly column where we highlight what’s trending in the tech world and list ways to explore these trends. This week, we...

Active Directory , ADManager Plus 2 min read Read

IT Security Under Attack: The ultimate playbook to counter cyberthreats

An employee checks their inbox and notices an email from HR with a worrying subject line reading, “Happy New Year! Structural changes in the company...

General , Log360 2 min read Read