XSIRT Newsletter, 02 September 2011: Sertifikat Digital Asli Tapi Palsu Semakin Marak

Sep 2nd, 2011 | By | Category: Newsletter, XSIRT

XecureIT Security Incident Response Team Newsletter DAFTAR ISI Agenda Berita Peringatan Keamanan Peringatan Kelemahan Peralatan Keamanan Klik disini untuk membaca XSIRT Newsletter edisi publik yang lain. AGENDA Information Security Training and Certification Schedule 3-in-1 Information Assurance Professional Training (CISSP-CISM-ISMS), 10-15 Oktober 2011 Certified Information Systems Security Professional (CISSP) Common Body of Knowledge Training, 10-14 Oktober […]



XSIRT Newsletter, 23 Agustus 2011: Kode Sumber Trojan Spyeye beredar di Internet

Aug 23rd, 2011 | By | Category: Incident Handling, Newsletter, XSIRT

XecureIT Security Incident Response Team Newsletter DAFTAR ISI Agenda Berita Laporan Penelitian Peringatan Kelemahan Peralatan Keamanan Tips   AGENDA Information Security Training and Certification Schedule 3-in-1 Information Assurance Professional Training (CISSP-CISM-ISMS), 10-15 Oktober 2011 Certified Information Systems Security Professional (CISSP) Common Body of Knowledge Training, 10-14 Oktober 2011 ISO 27001 Information Security Management System (ISMS) […]



XSIRT Newsletter, 12 Agustus 2011: Kelemahan paling berbahaya pada Blackberry Enterprise Server

Aug 12th, 2011 | By | Category: Newsletter, XSIRT

XecureIT Security Incident Response Team Newsletter DAFTAR ISI Agenda Berita Peringatan Kelemahan Peralatan Keamanan Tips AGENDA Information Security Training and Certification Schedule 3-in-1 Information Assurance Professional Training (CISSP-CISM-ISMS), 10-15 Oktober 2011 Certified Information Systems Security Professional (CISSP) Common Body of Knowledge Training, 10-14 Oktober 2011 ISO 27001 Information Security Management System (ISMS) Lead Implementer Training, […]



Real Time IT Security Monitoring and Audit Using SIEM Technology, 3 Days

Dec 21st, 2010 | By | Category: Training, XSIRT

Effectively manage the security information and events produced by your network is a very important process in holistic information security strategy. It is almost impossible to ensure your information protection without doing appropriate real time log analysis. Who should attend? IT and Information Security Professional, such as: Consultant, Auditor, Manager, Engineer and Administrator. Benefits The […]