logo-website
  • About Us
  • Services
    • Compliance & Certification
    • IT Security Risk Assesments
    • Penetration Testing
    • Application Security Assessment
    • Incident Response & Digital Forensics
    • Business Continuity Management & Disaster Recovery Planning
    • PCI DSS QSA
    • Data Privacy and Security Solutions
  • Industries
  • News & Events
  • Careers
  • Contact Us

Category: Security

Categories
  • AI (Artificial Intelegent)
  • Assessment
  • Data Privacy
  • Digital Forensik
  • Events
  • Industry
  • PCI DSS
  • Penetration Testing
  • Security
  • Talent Cyber Security
  • Technology
  • Uncategorized
Tags
AI Artificial intelligence BCM Business Continuity Business Management CISO cybercrime Cyber Security cybersecurity cybersecurityindonesia Data Privacy Digital Forensic Digital Resilience Summit Digital Security education Ethical Hacker Event Cyber Security FutureInTech govtech Hacker informationsecurity informationsecuritymanagementsystem itsystem Keamanan Siber PDP Pelindungan Data Pribadi Pendidikan Cyber Security Penetration Testing Pentest Recovery Planning SDLC Security securityexpert securityrisk securitytraining Sertifikasi Sertifikasi Cyber Security SOC 2 Source Code Talent Cyber Security Technology trainings Xynexis XynexisInternational Xynexis International

Phishing Attacks: Don’t Underestimate Their Power

|
  • Security
Back in the early 2000s, you among millions of people may have received an email from someone who claimed to ...
read more

Humans vs “Cyber Pandemic”: How to Prepare and Protect Data

|
  • Security
The world of information technology develops at an ever-increasing rate. It is safe and realistic to assume that there are ...
read more

Cybersecurity Breach: A Technical Problem with Financial Consequences

|
  • Security
By now the world should already know that businesses cannot operate without at least one form of digital process — ...
read more

Malware Threats in 2020 and What to Do About Them

|
  • Security
Anti-malware software, such as antivirus and firewalls, collectively detect suspicious packages of data within installers, zip files or other file ...
read more

Why Security Operations Centre (SOC) Is Essential To Your Business

|
  • Security
Security Operations Center or SOC usually consists of a team of specialists dedicated to detect, respond and prevent cyber security ...
read more

Crucial to Know: The Twitter Spear-Phishing Attack on July 2020

|
  • Security
Devious criminal schemes where the protagonists manage to pull off a near-impossible heist should remain in the realms of fiction. ...
read more
Ransomeware

Ransomware: A Plague in the Digital Age

|
  • Security
In the early days of computing technology, ‘malware’ were often created out of curiosity, to test out the limits of ...
read more
Cyber Crime

The ‘New Normal’ of Data Protection and Information Security

|
  • Security
The ‘new normal’ is happening now. Businesses are reopening after a month of forced closure due to regional quarantine, and ...
read more

Contact Us

  • Graha Mandiri 2nd Floor,
    Jl.Imam Bonjol No. 61
    Jakarta 10310
    Indonesia
  • +62 21-39834116
  • sales@xynexis.com

Follow Us

Privacy Notice

Xynexis International © 2025