top of page
Our Blog
Subscribe to get exclusive updates
Join our email list and get access to specials deals, news and many more exclusive
to our subscribers.
Giovanni Setyawan
Oct 20, 20244 min read
What Cyber Attacks Are Happening on Rail Systems?
Cybercriminals are no longer just going after banks or big tech—they’ve set their sights on rail systems too! With railways becoming more...
Giovanni Setyawan
Sep 12, 20243 min read
Railway Cyber Attacks Increased by 220% in Five Years
Railway cyber attacks have increased by 220% over the past five years, Explore real threats and strategies to prevent it.
Giovanni Setyawan
Aug 19, 20242 min read
Why is Cybersecurity Important for Operational Technology (OT) in Railways?
In this blog, we'll answer why is cybersecurity important for operational technology in railways and what crucial steps to take.
Giovanni Setyawan
Jul 19, 20242 min read
Recent Global CrowdStrike Outage Affected Microsoft, Gmail, Visa, and Banking Companies
In a Recent Global CrowdStrike Outage Affected Microsoft 365
Giovanni Setyawan
Jul 4, 20243 min read
Indonesia Faces Major Cybersecurity Breach 2024: Over 100 Government Institutions Affected
A new update on Indonesia's Cybersecurity Breach 2024
Giovanni Setyawan
Apr 2, 20243 min read
Securing Success: The Indispensable Role of Security Architecture for Your Company
Have you ever wondered what Role Security Architecture takes for your company? Then this blog will answer your question.
Giovanni Setyawan
Mar 18, 20244 min read
Securing the Future: Safeguarding Internet of Things (IoT) with Hardware Development for Informational Technology (IT) and Operational Technology
Safeguarding Internet of Things with Hardware Development for IT and OT
Giovanni Setyawan
Mar 5, 20242 min read
Safeguarding Your Data: The Importance of Encrypted Communication
Have you wondered how to keep important data safe within a company? Check out this blog as we help you how to safeguard your data.
Giovanni Setyawan
Feb 12, 20242 min read
Mitigating Supply Chain Risks: Safeguarding Against Vendor Vulnerabilities
We'll delve into Mitigating Supply Chain Risks: Safeguarding Against Vendor Vulnerabilities to give you a better understanding of it.
Giovanni Setyawan
Jan 15, 20242 min read
Resource Constraints: Lack of dedicated personnel and budget for cybersecurity measures
Empower your cybersecurity strategy!🚀 Explore our latest blog on overcoming resource constraints for robust digital defence.
Giovanni Setyawan
Dec 15, 20232 min read
Securing the Multimodal Era: Countering Cyber Attacks in AI's Multimodal Landscape
In this post, we'll explore more about Gemini - Google Newest Multimodal AI, its advantages and disadvantages. Along with the cyber threats.
Giovanni Setyawan
Nov 23, 20232 min read
5G Unveiled: Speeding Into the Future Amidst Cybersecurity Crossroads
In the race towards unparalleled connectivity, 5G emerges as the beacon of rapid communication and limitless possibilities. However, as...
John Iwasanmi
Oct 18, 20233 min read
From Vulnerability to Vigilance: The Essentials of Penetration Testing
Learning to stay ahead of threats is paramount. Welcome to a blog that takes you on a journey through the realms of security testing.
John Iwasanmi
Sep 25, 20232 min read
Exploring the Hacker Spectrum: Unmasking the Various Types of Cyber Intruders
In this modern age where digital transformation is rapidly reshaping the world, the relevance of wide and detailed cybersecurity measures...
Giovanni Setyawan
Sep 12, 20233 min read
Phishing, Smishing, Vishing: Exploring Different Faces of Cyber Deception
Has someone you didn’t know asked you about your bank account numbers or two code verification? If so, you might be targeted for...
Evan Jones
Mar 2, 20232 min read
One key to rule them all!
Post around password management and the dangers of not using one in your business
Evan Jones
Jan 19, 20233 min read
The Impact of Artificial Intelligence and Machine Learning on Cloud Security
Details how Machine Learning and AI can be leveraged to support Cloud Security and the benefits
Evan Jones
Dec 10, 20223 min read
UK NIS-D Changes Versus EU's NIS2-D
Blog overview on the recent changes associated with NIS-D in the UK and in the EU
Evan Jones
Feb 26, 20222 min read
Practical Advice for Businesses within Critical National Infrastructure (CNI)
Support for Ukraine businesses and advice on protecting your infrastructure from an increased threat of Cyber attacks on CNI
Evan Jones
Feb 19, 20224 min read
Asset Management: Is It Worth Doing?
Blog around Asset Management and its importance in Cybersecurity and risk evaluation
bottom of page