AWS
Opinion
Secondary Default Route Through Elastic IP Interface in AWS
This interesting case come from one of my client from US few months ago. It took me sometimes
to figure out how subnet, interface, and route work in AWS EC2.
Career
Cybersecurity
Strategi Menjadi Architect / Pre-Sales Dalam Industri IT Security
IT Security Solution Architect saya rasa masih cukup jarang di Indonesia. Role tersebut kurang
lebih mirip dengan Solution Architect (SA) namun untuk ranah IT / Cyber Security.
Case Study
Security Operation Center Over Desentralized Network
Exploring the implementation of a distributed Security Operation Center architecture that
operates across decentralized network infrastructure for enhanced security monitoring.
Case Study
Targeted Mass-Public Scanning
A comprehensive case study on implementing large-scale targeted scanning methodologies for
security assessment and vulnerability discovery across public-facing infrastructure.
Case Study
Pemrosesan Scanning Berskala Besar (PSBB) 🌏
Deep dive into large-scale scanning processing methodologies, infrastructure requirements, and
best practices for managing massive security scanning operations across global networks.
Opinion
The Art of Data Visualisation
Exploring the intersection of data science and visual design, this article discusses best
practices, tools, and techniques for creating compelling and informative data visualizations.
Lesson Learnt
PHK dan Transformasi Digital
Selama satu tahun terakhir saya terlibat beberapa proyek transformasi digital khususnya RPA
(Robotic Process Automation) dilingkungan industri telekomunikasi, dan juga industri finansial.
Computer Programming
Lesson Learnt
Bagaimana Mengkuantifikasi Resiko? (2)
Ketika mempresentasikan hasil audit atau pentest kepada stakeholder terutama higher management
termasuk C-Level, kira-kira dari dua pernyataan berikut manakah yang lebih mudah dipahami?
DevOps
How does Python setuptools work?
I am sure this question quite often asked by most people especially when dealing with python
project. Most of the apps currently include automation script, "run and it should work".
Case Study
Cybersecurity
Prioritisation to Prediction by KENNA Security and CYENTIA Institute
Analyzing advanced vulnerability management approaches that move beyond traditional
prioritization toward predictive security analytics using data-driven methodologies.
Case Study
Mekanisme Prioritisasi Remediasi Aset Dengan Bantuan Threat Intelligence
Understanding how to effectively prioritize asset remediation using threat intelligence data,
risk scoring methodologies, and automated decision-making frameworks.