Contact Us
  • Home
  • Services
    VIEW BY
    CAPABILITIES
    ALL SERVICES

    CLOUD & IT SECURITY
    • Cloud Security
    • Zero Trust Architecture
    SOC SERVICES
    • SOC as a Service
    • Managed SOC
    • Hybrid SOC
    OFFENSIVE SECURITY
    • VAPT Services
    INCIDENT RESPONSE
    • Incident Response & Digital Forensics
    • Malware Removal
    CYBERCRIME & DATA
    • Cybercrime Investigation
    • Data Protection
    CONSULTING & ADVISORY
    • Cybersecurity Consulting

    SOC as a Service
    Managed SOC
    Hybrid SOC
    VAPT Services
    Cloud Security
    Incident Response & Digital Forensics
    Malware Removal
    Cybercrime Investigation
    Cybersecurity Consulting
    Data Protection
    Zero Trust Architecture

  • About
  • Resources
    • Events
    • Blogs
    • Press
  • Home
  • Services
    VIEW BY
    CAPABILITIES
    ALL SERVICES

    CLOUD & IT SECURITY
    • Cloud Security
    • Zero Trust Architecture
    SOC SERVICES
    • SOC as a Service
    • Managed SOC
    • Hybrid SOC
    OFFENSIVE SECURITY
    • VAPT Services
    INCIDENT RESPONSE
    • Incident Response & Digital Forensics
    • Malware Removal
    CYBERCRIME & DATA
    • Cybercrime Investigation
    • Data Protection
    CONSULTING & ADVISORY
    • Cybersecurity Consulting

    SOC as a Service
    Managed SOC
    Hybrid SOC
    VAPT Services
    Cloud Security
    Incident Response & Digital Forensics
    Malware Removal
    Cybercrime Investigation
    Cybersecurity Consulting
    Data Protection
    Zero Trust Architecture

  • About
  • Resources
    • Events
    • Blogs
    • Press
Contact Us
  • EN
    • EN
    • ID
  • EN
    • EN
    • ID

Blog

Software supply chain visibility
1 hour ago Tags
  • Blog
  • Cybercrime Investigation & Data Protection

Implementing SBOMs: Securing the Software Supply Chain Against Third-Party Dependencies

Posted by Zentara Team

Enterprise Attack Surface Management
Tags
  • Blog
  • Cybersecurity Consulting

Enterprise Attack Surface Management: Finding Risks Before Attackers Do

secure by design MVP security
Tags
  • Blog
  • Cybersecurity Consulting

Secure by Design: Why Your MVP Defines Security Posture

Cybersecurity due diligence in M&A
Tags
  • Blog
  • Cybersecurity Consulting

M&A Cyber Due Diligence: Discovering Hidden Breaches Before You Close the Deal

red team engagements
Tags
  • Blog
  • Vulnerability Assessment & Penetration Testing

Red Team Lessons from 500+ Engagements: The Patterns That Keep Appearing

HAProxy sticky sessions
Tags
  • Technical Guides

How to Implement Advanced HAProxy Sticky Sessions for Scalable Websocket Infrastructure

Load moreLoadingAll items loaded
Categories
  • AI in Cybersecurity
  • Blog
  • Cloud & IT Security
  • Cybercrime Investigation & Data Protection
  • Cybersecurity Consulting
  • Incident Response & Digital Forensics
  • Security Operations Center (SOC)
  • Technical Guides
  • Vulnerability Assessment & Penetration Testing
Software supply chain visibility
Tags
  • Blog
  • Cybercrime Investigation & Data Protection

Zentara Team

1 hour ago
Implementing SBOMs: Securing the Software Supply Chain Against Third-Party Dependencies
Modern software is rarely built from scratch; most applications rely
Enterprise Attack Surface Management
Tags
  • Blog
  • Cybersecurity Consulting

Zentara Team

1 hour ago
Enterprise Attack Surface Management: Finding Risks Before Attackers Do
Modern enterprises are more connected than ever. Cloud adoption, remote
secure by design MVP security
Tags
  • Blog
  • Cybersecurity Consulting

Zentara Team

20 hours ago
Secure by Design: Why Your MVP Defines Security Posture
Speed drives product teams. The push to launch quickly, gain
Cybersecurity due diligence in M&A
Tags
  • Blog
  • Cybersecurity Consulting

Toni Widiarto

1 day ago
M&A Cyber Due Diligence: Discovering Hidden Breaches Before You Close the Deal
Mergers and acquisitions offer significant business opportunities, but they also
red team engagements
Tags
  • Blog
  • Vulnerability Assessment & Penetration Testing

Toni Widiarto

1 day ago
Red Team Lessons from 500+ Engagements: The Patterns That Keep Appearing
Many organisations assume successful cyber attacks rely on advanced exploits
HAProxy sticky sessions
Tags
  • Technical Guides

Adam

1 day ago
How to Implement Advanced HAProxy Sticky Sessions for Scalable Websocket Infrastructure
Why WebSocket Load Balancing Breaks Without Sticky Sessions At Zentara,
Smart city IoT security architecture
Tags
  • Blog
  • Cloud & IT Security

Surya Maulana

2 days ago
Smart City Vulnerabilities: Securing Large-Scale IoT Deployments in Southeast Asia
Southeast Asia is rapidly embracing smart city initiatives. From connected
SOC automation
Tags
  • Blog
  • Security Operations Center (SOC)

Marsha Widagdo

2 days ago
SOC Automation Done Right: Where Automation Helps and Where It Breaks
Security Operations Centres (SOCs) are under constant pressure. Alert volumes
Cloud security consolidation strategies
Tags
  • Blog
  • Cloud & IT Security

Darian Kuswanto

5 days ago
The Shift to CNAPP: Consolidating Cloud Security for Multi-Cloud Environments
Enterprises are adopting multi-cloud environments to gain flexibility, scalability, and
Autonomous cyber attacks
Tags
  • AI in Cybersecurity
  • Blog

Trimikha Valentius

5 days ago
The Rise of Autonomous Cyber Attacks: When AI Becomes the Adversary
Artificial intelligence is reshaping cybersecurity at an unprecedented pace. While
Load moreLoadingAll items loaded
Software supply chain visibility
Blog

Implementing SBOMs: Securing the Software Supply Chain Against Third-Party Dependencies

Modern software is rarely built from scratch; most applications rely

Enterprise Attack Surface Management
Blog

Enterprise Attack Surface Management: Finding Risks Before Attackers Do

Modern enterprises are more connected than ever. Cloud adoption, remote

secure by design MVP security
Blog

Secure by Design: Why Your MVP Defines Security Posture

Speed drives product teams. The push to launch quickly, gain

Cybersecurity due diligence in M&A
Blog

M&A Cyber Due Diligence: Discovering Hidden Breaches Before You Close the Deal

Mergers and acquisitions offer significant business opportunities, but they also

HAProxy sticky sessions
Technical Guides

How to Implement Advanced HAProxy Sticky Sessions for Scalable Websocket Infrastructure

Why WebSocket Load Balancing Breaks Without Sticky Sessions At Zentara,

red team engagements
Blog

Red Team Lessons from 500+ Engagements: The Patterns That Keep Appearing

Many organisations assume successful cyber attacks rely on advanced exploits

« Previous Next »
  • TALK TO A CYBERSECURITY EXPERT

Need a Trusted Cybersecurity Partner? Let’s Connect.

Modern cybersecurity services built for cloud-native, hybrid, and multi-cloud environments.

Linkedin X-twitter Github Youtube
  • Contact :
  • [email protected]
  • Indonesia
  • ZENTARA TECHNOLOGIES HQ
    BAIC Tower Lt. 16. Jl. Gading Serpong
    Boulevard blok S no.8, Banten 15810
  • Singapore
  • ZENTARA TECHNOLOGIES
    SBF building 160 Robinson Rd, 068914
  • COMPANY
  • About Us
  • Events
  • Press
  • Contact Us
  • Blog
  • Divisions
  • Cybersecurity
  • Cyber Intelligence
  • Enterprise Solutions
  • Defence
  • Labs
  • Services
  • SOC as a Service
  • Managed SOC
  • VAPT Services
  • Cloud Security
  • Incident Response & Digital Forensics
  • Malware Removal
  • Cybercrime Investigation
  • Cybersecurity Consulting
  • Data Protection
  • Zero Trust Architecture
  • © 2026 ZENTARA. All rights reserved. Registered PSE No. 020644.01/DJAI.PSE/11/2025.
    Privacy Policy. Terms and Conditions.