Logo
Monitor Illustration
Blog

News, Article, and Solution in Cybersecurity Realms.

Mengapa Inventaris Aset Adalah Fondasi Pertahanan Siber yang Kuat
Teknologi

Mengapa Inventaris Aset Adalah Fondasi Pertahanan Siber yang Kuat

ITSEC AsiaITSEC Asia
|
Jan 09, 2026 4 minutes read

PENDAHULUAN Banyak serangan siber berhasil bukan karena alat keamanannya gagal, tapi karena perusahaan tidak benar-benar tahu apa yang sedang mereka lindungi. Menurut World Economic Forum, risiko siber terus meningkat seiring makin rumitnya dunia digital kita, apalagi dengan maraknya penggunaan cloud dan kerja jarak jauh (remote work). Sistem, aplikasi, dan perangkat baru bertambah lebih cepat daripada kemampuan tim keamanan untuk mencatatnya. Lama-lama, ada aset yang terlupakan, tidak terkelola, atau dibiarkan tanpa pengamanan yang benar. Aset-aset "gaib" inilah yang sering jadi pintu masuk paling empuk bagi penyerang. Catatan: Jika Anda ingin penjelasan lebih dasar, coba cek artikel kami sebelumnya: Why You Need To Take Asset Inventory Seriously [https://itsec.asia/blog/why-you-need-to-take-asset-inventory-seriously?utm_source=chatgpt.com]. Di sana dijelaskan konsep dasarnya dengan bahasa yang lebih sederhana. Artikel ini akan membahas lebih lanjut mengapa inventarisasi aset adalah kemampuan dasar yang wajib dimiliki untuk pertahanan siber modern. APA ITU INVENTARISASI ASET KEAMANAN SIBER? Singkatnya, ini adalah proses mendata dan menjaga visibilitas (pemantauan) atas semua aset digital di dalam organisasi Anda. Ini mencakup: * Endpoints: Seperti laptop, server, dan perangkat seluler (HP/tablet). * Infrastruktur Jaringan: Router, switch,

Professor IllustrationAndroid IllustrationMonitors Illustration

Recent Highlights

Is Using a VPN Really Safe? Here’s the Reality Check.
Cybersecurity

Is Using a VPN Really Safe? Here’s the Reality Check.

ITSEC AsiaITSEC Asia
|
Mar 13, 2026 6 minutes read

INTRODUCTION Today, almost everything we do happens online, from working and studying to shopping and banking. While the internet makes life easier, it also comes with certain risks, especially when it comes to privacy and data security. Many people connect to public Wi-Fi in places like cafés, airports, or hotels without realizing that these networks may not always be secure. In some cases, attackers can monitor or intercept data that travels through these connections. This is where VPN apps become useful. A VPN app helps create a safer internet connection by protecting your data and hiding your online identity. Even if you are using an open network, a VPN can help keep your activity more private. This article will explain what a VPN app is, how it works, and why it has become an important tool for safer internet use. Source: pr.norton.com [https://pr.norton.com/blog/privacy/what-is-a-vpn?utm_], security.org [https://www.security.org/vpn/?utm_], fortinet.com [https://www.fortinet.com/resources/cyberglossary/vpn-wifi?utm_] WHAT IS A VPN APP? A VPN app is a tool that helps protect your internet connection and online activity. VPN stands for Virtual Private Network.

How IoT Devices Are Expanding the Cybersecurity Attack Surface
Cybersecurity

How IoT Devices Are Expanding the Cybersecurity Attack Surface

ITSEC AsiaITSEC Asia
|
Mar 06, 2026 5 minutes read

INTRODUCTION When people hear “IoT security, [https://itsec.asia/services/ot-ics-cybersecurity]” they often assume it’s something only IT teams need to worry about. In reality, IoT security affects everyday users, households, and businesses alike.* From smart home devices to office surveillance systems, connected devices are now part of critical daily operations. The more devices we connect, the wider the potential attack surface becomes. Here’s the part no one really talks about: Many IoT environments are deployed quickly for convenience, not necessarily designed with security as the top priority. It’s not negligence. It’s just how fast technology moves. Source: aciano.net [https://aciano.net/blog/iot-security-risks/], cio.com [https://www.cio.com/article/3990581/iot-security-challenges-and-best-practices-for-a-hyperconnected-world.html?] THE IOT LANDSCAPE NOWADAYS Security used to focus on protecting networks with firewalls and perimeter defenses. Today, attackers are shifting their focus to easier targets: user credentials, weak device authentication, misconfigured cloud dashboards, and unpatched firmware.  Today, attackers are more interested in: * User credentials * Weak device authentication * Misconfigured cloud dashboards * Unpatched firmware IoT devices often rely on cloud platforms for monitoring, analytics, and control. That means IoT security is no longer just about the

ITSEC Asia (IDX: CYBR) Bersama UNFPA Resmikan Program SHECURE Digital
News

ITSEC Asia (IDX: CYBR) Bersama UNFPA Resmikan Program SHECURE Digital

ITSEC AsiaITSEC Asia
|
Feb 27, 2026 5 minutes read

Jakarta, 27 Februari 2026—Hampir 2 dari 3 perempuan di seluruh dunia pernah mengalami kekerasan digital. Di Indonesia, sekitar 7,2 juta perempuan pernah mengalami kekerasan digital oleh bukan pasangan di sepanjang hidup mereka, menurut Survei Pengalaman Hidup Perempuan Nasional (SPHPN) 2024. Perempuan berusia 15-24 tahun paling banyak mengalami kekerasan di ruang-ruang digital ini. Untuk memperkuat perlindungan perempuan dan anak di ruang digital, PT ITSEC Asia Tbk (ITSEC Asia) (IDX: CYBR) perusahaan keamanan siber terdepan di Indonesia, bersama United Nations Population Fund (UNFPA), badan Perserikatan Bangsa Bangsa yang fokus pada kesehatan seksual dan reproduksi serta kependudukan  secara resmi meluncurkan ”SHECURE Digital” sebagai inisiatif nasional. Peluncuran ini dihadiri juga oleh Menteri Kementerian Pemberdayaan Perempuan dan Perlindungan Anak Republik Indonesia (KemenPPPA) Arifah Fauzi, sebagai wujud komitmen bersama dalam membangun ekosistem digital yang aman inklusif dan berorientasi pada perlindungan. “SHECURE Digital” mengintegrasikan edukasi perlindungan diri digital, perlindungan teknologi berbasis privasi dan advokasi berbasis data untuk mencegah dan menangani kekerasan berbasis gender online serta eksploitasi digital. Program ini diluncurkan di tengah meningkatnya risiko kekerasan berbasis gender online yang dialami perempuan

Editor's Choice

Understanding the Diverse Sources and Platforms of Threat Intelligence

Juli 21, 2023

Jenkins + Gitlab + Sonarqube + Maven Integration: DevOps Configuration

Juli 11, 2023

Automated Suricata-to-ATT&CK Mapper using Machine Learning

Juli 21, 2023

Setup Basic Hacking Lab Infrastructure

Juli 21, 2023

Binary Analysis With RetDec and SYNOPSYS Code-DX

Juli 21, 2023

Streamlining Suricata / Snort Signature Development with Dalton

Juli 21, 2023
No article found

Receive weekly
updates on new posts

Subscribe