Exploring What’s Next in Identity and Security

 

Discover fresh perspectives on fraud prevention, cybersecurity, and digital signature solutions. Gain in-depth knowledge on cyber risk, compliance, and digital trust strategies through our expert articles.

Blog_1024x768
 

Browse our latest articles and resources

What is a DDoS Attack? How It Works and How to Prevent It

What is a DDoS Attack? How It Works and How to Prevent It

A DDoS attack can overwhelm websites and online services with massive traffic. Learn how it works, common warning signs, and ways to reduce...

May 01, 2026

Phishing Attack: Definition, Examples, and Prevention Tips

Phishing Attack: Definition, Examples, and Prevention Tips

Phishing is a common online scam used to steal sensitive information. Learn what it is, see real examples, and discover practical ways to a...

April 30, 2026

Behavioral Biometrics: How It Works and Why It Matters for Fraud Prevention

Behavioral Biometrics: How It Works and Why It Matters for Fraud Prevention

Behavioral biometrics analyzes user behavior patterns to detect fraud in real time. Learn how it works and why it’s essential for modern di...

April 30, 2026

The World of VIDA: Invisible Infrastructure Behind Digital Identity

The World of VIDA: Invisible Infrastructure Behind Digital Identity

Explore how invisible digital identity infrastructure protects everyday transactions while strengthening fraud awareness in Indonesia’s dig...

April 07, 2026

The Hidden Pattern Behind Rising Digital Transactions and Fraud

The Hidden Pattern Behind Rising Digital Transactions and Fraud

Digital fraud tends to rise when transaction activity surges. VIDA’s data reveals that periods such as THR disbursement and payday have bec...

March 26, 2026

e-Sign is Now Available in Malaysia

e-Sign is Now Available in Malaysia

Malaysia e-Sign is here. Sign documents legally on the web, securely and compliantly.

March 17, 2026

From Petty Crime to Industrialized Operations: Key Insights from Endgame Podcast on Systemic Fraud

From Petty Crime to Industrialized Operations: Key Insights from Endgame Podcast on Systemic Fraud

Fraud is no longer isolated crime. It has become systemic, industrialized, and embedded in digital infrastructure across Southeast Asia. In...

March 15, 2026

Bonus Season Is Prime Time for Fraud, and One Click Could Cost You Everything

Bonus Season Is Prime Time for Fraud, and One Click Could Cost You Everything

As the Tunjangan Hari Raya (THR), Indonesia’s mandatory holiday allowance paid ahead of major religious holidays, approaches, digital trans...

March 12, 2026

How to Apply for UMKM Assistance Online and Tips to Pass Verification

How to Apply for UMKM Assistance Online and Tips to Pass Verification

Want to start a small business (UMKM)? Learn the complete guide to applying for UMKM assistance online, along with practical tips to help y...

March 02, 2026

Disbursement of THR for Retired Civil Servants: Schedule and Mechanism

Disbursement of THR for Retired Civil Servants: Schedule and Mechanism

When can retired civil servants (PNS) receive their THR? Here’s a complete guide covering the definition, schedule, components, and legal b...

February 24, 2026

How to Calculate THR: Complete Guide with Formulas and Examples

How to Calculate THR: Complete Guide with Formulas and Examples

Want to know how much THR (Holiday Allowance) you’ll receive? Here’s a complete guide on calculating THR for employees, including prorated ...

February 23, 2026

Types of Taxes and the Convenience of the Coretax System

Types of Taxes and the Convenience of the Coretax System

Learn about the different types of taxes in Indonesia, their benefits, and how Coretax supports secure, integrated tax reporting.

February 11, 2026

Best Health Insurance: Types and How to Manage Them

Best Health Insurance: Types and How to Manage Them

Unpredictable medical costs make it essential to consider health insurance. Here's how to choose the right insurance based on types, benefi...

February 05, 2026

Best Car Insurance: Types and How to Manage Them

Best Car Insurance: Types and How to Manage Them

Choosing the best car insurance usually comes down to your needs and your vehicle's risk profile. Here's a guide to help you pick the right...

February 05, 2026

Examples of Digital Documents You Should Know About

Examples of Digital Documents You Should Know About

Learn about the different types of digital documents you'll frequently use in the workplace — from examples and risks to how to keep them l...

February 04, 2026

A Complete and Easy-to-Follow Guide to Filing a Car Insurance Claim

A Complete and Easy-to-Follow Guide to Filing a Car Insurance Claim

Confused about how to file a car insurance claim? Check out this complete guide covering the step-by-step process, required documents, and ...

February 04, 2026

The New Digital Crime Economy: Why AI-Driven Fraud Syndicates are the 'Startups' of the New Era

The New Digital Crime Economy: Why AI-Driven Fraud Syndicates are the 'Startups' of the New Era

AI-powered attacks—such as large-scale deepfake attacks, synthetic identity fraud, and automated device farms—are effectively eroding trad...

February 03, 2026

AI Used for Fraud Detection: How Does It Work?

AI Used for Fraud Detection: How Does It Work?

Fraud is becoming harder to detect with traditional methods. Learn why AI is reshaping how organizations identify and prevent digital fraud...

January 28, 2026

Photo Manipulation: A Hidden Threat Behind Digital Onboarding

Photo Manipulation: A Hidden Threat Behind Digital Onboarding

The rise of photo manipulation used in digital onboarding. Understand the risks to identity, fraud, and financial security. Let’s take a cl...

January 15, 2026

Hacking: A Real Threat in the Digital Identity Era

Hacking: A Real Threat in the Digital Identity Era

Hacking has become a serious risk in the era of AI, deepfake, and modern hacking practices. Understand the definition.

January 12, 2026

Authorized Representative Signatures: Secure and Proper Examples

Authorized Representative Signatures: Secure and Proper Examples

Not all signatures made on behalf of a representative are legally valid. Learn more about proper signature formats and the risks involved i...

January 03, 2026

Coretax Impersonation: Definition, How It Works, and Security Tips

Coretax Impersonation: Definition, How It Works, and Security Tips

Coretax impersonation plays an important role in the DJP system. Explore how it works, what it’s used for, and how to use it securely.

January 01, 2026

Invoice vs Receipt: Key Differences and How They’re Used

Invoice vs Receipt: Key Differences and How They’re Used

Don’t get them mixed up! Learn the differences between invoices and receipts, from their definitions and document structure to when each on...

January 01, 2026

Invoice Applications: A Smarter Way to Manage Billing

Invoice Applications: A Smarter Way to Manage Billing

Still handling invoices manually? Invoice applications simplify digital invoice creation, delivery, and tracking for more efficient billing...

December 31, 2025

Got a Question?

We're Here to Help!

form-img