Category: Network and Security

Inilah Cara untuk Membuat Remote Digital Workspaces System Tetap Aman Selama dan Setelah pandemi

Berikut faktor terpenting dalam kemanan sistem remote.     Ketika pandemi hadir, banyak perusahaan dunia mulai mengaktifkan dan menjalankan sistem remote work. Menurut Tim Farrel seorang Master Cybersecurity Architect Hewlett Packard Enterprise (HPE) berpendapat bahwa, pandemi ini telah menjadi peringatan untuk meningkatkan kemampuan karyawan dalam melakukan pekerjaan di perangkat apapun, dari mana pun dan kapan […]

Read Full Article

Announcing Cisco Embedded Wireless … Anywhere

  By: Anthony Savaglio Source: blog.cisco.com   For today’s everyday activities and work, wireless connectivity has shifted from a luxury to a necessity. More and more industries and public spaces require reliable, secure, and fast Wi-Fi for a growing list of use cases. The world’s needs have evolved from a one-size-fits-all network to requiring tailor-made […]

Read Full Article

Securing Remote Work: Protecting Endpoints the Right Way

  By: Gedeon Hombrebueno Source: www.blogs.cisco.com   The remote work environment has been around for years. In fact, 56% of employees in the US have a job where some of what they do could be done remotely even before the pandemic. However, no one could have predicted the sudden need to fast-track remote worker access […]

Read Full Article

Dapatkah Intrinsic Security Mengubah Cybersecurity Perusahaan?

  Tom Corn, Senior Vice President untuk Security Product VMWare menyatakan bahwa pergeseran dari siloed to unified, threat-centric to context-centric, bolted-on to built-in akan memberikan peluang untuk mengubah keamanan secara fundamental. Keamanan adalah topik yang hangat dan paling sering dibicarakan sebab keamanan merupakan masalah yang paling serius dalam perusahaan diseluruh dunia. Tantangan mendasar yang harus […]

Read Full Article

Security is Everyone’s Job

    By: Kevin Cross source: www.delltechnologies.com   When was the last time you left the garage open on your way out of the house? How about the last time you left your front door unlocked before turning in for the night and going to bed? I would bet you are having a hard time recalling an example. When it […]

Read Full Article

‘Modern Bank Heists’ Threat Report from VMware Carbon Black Finds Dramatic Increase in Cyberattacks Against Financial Institutions Amid COVID-19

    VMware, Inc. (NYSE: VMW), a leading innovator in enterprise software, today released the third annual “Modern Bank Heists” report, produced by VMware Carbon Black. The report combines original VMware Carbon Black threat data analysis with annual survey results featuring responses from 25 leading financial institution CISOs.   “Financial institutions have long been targets for cybercrime […]

Read Full Article

To Secure Your Organization Begin at The End

    Vivek Bhargava source: cisco.com   Endpoints, that is. After all, defense breaches, malware introduction, and security risks often arise from exploitation of endpoints such as user devices and smart things (IoT) connected to the network. And as organizations are going digital, their users are bringing in ever more devices, and their operations are […]

Read Full Article

A Trio of Releases from Cisco Wireless!

Byron Magrane Source: cisco.com   With new Cisco innovations, your network is better equipped and more prepared to take advantage of the Wi-Fi 6 (802.11ax) standard.   The benefits are true for any size organization. Cisco is happy to announce new hardware and software releases that will bring smaller and medium-sized businesses to the forefront […]

Read Full Article

Inilah 10 Tahapan Optimalisasi DevOps dan Security

  Penulis: Kodrat Wahyudi   Kegagalan dalam penerapan langkah-langkah keamanan informasi yang memadai di dunia saat ini dapat menyebabkan konsekuensi yang siginifikan. Keamanan informasi harus menjadi bagian yang tidak terpisahkan dari pipeline pengiriman berkelanjutan, itulah sebabnya konsep DevSecOps menjadi semakin populer.   DevOps mungkin menawarkan cara untuk tetap gesit dan beroperasi dengan efisiensi tinggi, tetapi […]

Read Full Article

Seberapa Amankah Device yang Kamu Miliki?

  Penulis: Kodrat Wahyudi   Device apakah yang biasanya kita gunakan? iPhone atau Android? Pertanyaan selanjutnya: apakah iPhone benar-benar lebih aman daripada Android?   Keamanan dengan cara Apple   Apple dikenal sebagai pemenang dalam hal keamanan seluler. Apple berhasil mengontrol rantai pasokan hardware-nya serta mengontrol aplikasi dari pengembang independen. Bisa jadi aplikasi ditolak karena alasan […]

Read Full Article