top of page
Our Blog
Subscribe to get exclusive updates
Join our email list and get access to specials deals, news and many more exclusive
to our subscribers.

Giovanni Setyawan
Jan 274 min read
How to Secure CBTC From Cyber Attacks?
Explore CBTC: What it is, how it works, and its advantages for rail systems. Learn how to secure this critical technology.

Giovanni Setyawan
Dec 9, 20244 min read
2024 Highlights: A Decade of Cybersecurity Innovation and Achievements
2024 was certainly a busy year for us. Read the full version on our achievements and what we've been up to in 2024.


Giovanni Setyawan
Feb 12, 20242 min read
Mitigating Supply Chain Risks: Safeguarding Against Vendor Vulnerabilities
We'll delve into Mitigating Supply Chain Risks: Safeguarding Against Vendor Vulnerabilities to give you a better understanding of it.


Giovanni Setyawan
Nov 23, 20232 min read
5G Unveiled: Speeding Into the Future Amidst Cybersecurity Crossroads
In the race towards unparalleled connectivity, 5G emerges as the beacon of rapid communication and limitless possibilities. However, as...


John Iwasanmi
Oct 18, 20233 min read
From Vulnerability to Vigilance: The Essentials of Penetration Testing
Learning to stay ahead of threats is paramount. Welcome to a blog that takes you on a journey through the realms of security testing.


John Iwasanmi
Sep 25, 20232 min read
Exploring the Hacker Spectrum: Unmasking the Various Types of Cyber Intruders
In this modern age where digital transformation is rapidly reshaping the world, the relevance of wide and detailed cybersecurity measures...


Giovanni Setyawan
Sep 12, 20233 min read
Phishing, Smishing, Vishing: Exploring Different Faces of Cyber Deception
Has someone you didn’t know asked you about your bank account numbers or two code verification? If so, you might be targeted for...
bottom of page