Exploring What’s Next in Identity and Security

 

Discover fresh perspectives on fraud prevention, cybersecurity, and digital signature solutions. Gain in-depth knowledge on cyber risk, compliance, and digital trust strategies through our expert articles.

Blog_1024x768
 

Browse our latest articles and resources

Types of Taxes and the Convenience of the Coretax System

Types of Taxes and the Convenience of the Coretax System

Learn about the different types of taxes in Indonesia, their benefits, and how Coretax supports secure, integrated tax reporting.

February 11, 2026

The New Digital Crime Economy: Why AI-Driven Fraud Syndicates are the 'Startups' of the New Era

The New Digital Crime Economy: Why AI-Driven Fraud Syndicates are the 'Startups' of the New Era

AI-powered attacks—such as large-scale deepfake attacks, synthetic identity fraud, and automated device farms—are effectively eroding trad...

February 03, 2026

AI Used for Fraud Detection: How Does It Work?

AI Used for Fraud Detection: How Does It Work?

Fraud is becoming harder to detect with traditional methods. Learn why AI is reshaping how organizations identify and prevent digital fraud...

January 28, 2026

Photo Manipulation: A Hidden Threat Behind Digital Onboarding

Photo Manipulation: A Hidden Threat Behind Digital Onboarding

The rise of photo manipulation used in digital onboarding. Understand the risks to identity, fraud, and financial security. Let’s take a cl...

January 15, 2026

Hacking: A Real Threat in the Digital Identity Era

Hacking: A Real Threat in the Digital Identity Era

Hacking has become a serious risk in the era of AI, deepfake, and modern hacking practices. Understand the definition.

January 12, 2026

Authorized Representative Signatures: Secure and Proper Examples

Authorized Representative Signatures: Secure and Proper Examples

Not all signatures made on behalf of a representative are legally valid. Learn more about proper signature formats and the risks involved i...

January 03, 2026

Coretax Impersonation: Definition, How It Works, and Security Tips

Coretax Impersonation: Definition, How It Works, and Security Tips

Coretax impersonation plays an important role in the DJP system. Explore how it works, what it’s used for, and how to use it securely.

January 01, 2026

Invoice vs Receipt: Key Differences and How They’re Used

Invoice vs Receipt: Key Differences and How They’re Used

Don’t get them mixed up! Learn the differences between invoices and receipts, from their definitions and document structure to when each on...

January 01, 2026

Invoice Applications: A Smarter Way to Manage Billing

Invoice Applications: A Smarter Way to Manage Billing

Still handling invoices manually? Invoice applications simplify digital invoice creation, delivery, and tracking for more efficient billing...

December 31, 2025

How to Create an Invoice: A Complete Guide and Common Mistakes

How to Create an Invoice: A Complete Guide and Common Mistakes

Need practical tips on creating invoices and invoice numbers? Follow this complete guide to streamline billing while staying secure and com...

December 30, 2025

Service Invoice Examples in Various Business Sectors

Service Invoice Examples in Various Business Sectors

Not sure how to create a proper invoice? Learn the right service invoice format, its key functions, and common mistakes to avoid.

December 29, 2025

Vendor Management System: The Key to Efficient Vendor Operations

Vendor Management System: The Key to Efficient Vendor Operations

Explore what a vendor management system is, how it works, and real-world examples to manage vendor operations more efficiently and with bet...

December 26, 2025

Vendors Explained: Their Role and Types in Modern Business

Vendors Explained: Their Role and Types in Modern Business

Vendors are an essential part of any business partnership. Learn their definition, roles, types, and the key legal and contractual aspects....

December 25, 2025

Tax Consultants Explained: Their Roles, Duties, and Challenges

Tax Consultants Explained: Their Roles, Duties, and Challenges

Learn about tax consultants, their roles and responsibilities, and the ethical standards they must uphold when assisting taxpayers.

December 24, 2025

Tax Payment Codes: A Complete Guide to Avoid Payment Errors

Tax Payment Codes: A Complete Guide to Avoid Payment Errors

Mistakes in tax payment codes can result in costly penalties. Learn their purpose, common examples, and how to avoid the risks.

December 23, 2025

How to Send a PDF on WhatsApp and How Safe It Really Is

How to Send a PDF on WhatsApp and How Safe It Really Is

Learn how to send PDF files via WhatsApp from your phone or laptop. Understand the risks of document theft and how to protect your importan...

October 24, 2025

Biometric Liveness: What It Is and Why It Matters for Identity Security

Biometric Liveness: What It Is and Why It Matters for Identity Security

Biometric liveness technology ensures that identity verification is performed only by real humans—not deepfakes. Learn how it works and why...

October 24, 2025

Fake ID Cards: Types of Scams and How to Avoid Them

Fake ID Cards: Types of Scams and How to Avoid Them

Fake ID scams have become increasingly common. It’s important to understand the types of fraud, how they work, and how you can protect your...

October 21, 2025

KYC: What It Is and How It Protects Your Identity

KYC: What It Is and How It Protects Your Identity

KYC is the process of verifying a user’s identity to guard against digital fraud. Why is it necessary—and why should you care? Let’s explor...

October 20, 2025

Liveness Detection: Telling Humans Apart from Deepfakes

Liveness Detection: Telling Humans Apart from Deepfakes

Advanced technology like liveness detection can distinguish real faces from deepfakes. Take action now—protect your identity and stay ahead...

October 18, 2025

Free Online Signatures: Are All Websites Legal?

Free Online Signatures: Are All Websites Legal?

Find out whether all free digital signature services are actually legal. Learn the differences and discover solutions that are officially r...

October 14, 2025

Coretax Tax Invoice: Guide, E-Signature, and Digital Certificate

Coretax Tax Invoice: Guide, E-Signature, and Digital Certificate

Learn how to easily create complete tax invoices in Coretax, including how to apply digital signatures, electronic certificates, and DJP au...

October 10, 2025

Forgery of Digital Signatures: Legal Provisions and Penalties

Forgery of Digital Signatures: Legal Provisions and Penalties

Understand the legal foundations surrounding signature forgery, the criminal sanctions involved, and how to prevent it using certified digi...

October 04, 2025

Examples of Personal Data Most Easily Stolen by Hackers

Examples of Personal Data Most Easily Stolen by Hackers

Be aware of the types of personal data—such as your name, national ID number (NIK), email, and more—that hackers can steal easily. Learn wh...

October 04, 2025

Got a Question?

We're Here to Help!

form-img