<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>BINUS @Bekasi - Kampus Beken Asyik | Business Service and Technology</provider_name><provider_url>https://binus.ac.id/bekasi</provider_url><author_name>editorarticle</author_name><author_url>https://binus.ac.id/bekasi/author/editorarticle/</author_url><title>Membangun Benteng Digital - BINUS @Bekasi - Kampus Beken Asyik | Business Service and Technology</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="YOpc7XbJDk"&gt;&lt;a href="https://binus.ac.id/bekasi/2025/10/membangun-benteng-digital/"&gt;Membangun Benteng Digital&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://binus.ac.id/bekasi/2025/10/membangun-benteng-digital/embed/#?secret=YOpc7XbJDk" width="600" height="338" title="&#x201C;Membangun Benteng Digital&#x201D; &#x2014; BINUS @Bekasi - Kampus Beken Asyik | Business Service and Technology" data-secret="YOpc7XbJDk" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://binus.ac.id/bekasi/wp-content/uploads/2025/12/Untitled-design-3-1.png</thumbnail_url><thumbnail_width>602</thumbnail_width><thumbnail_height>401</thumbnail_height><description>Figure 1. Kastil Megah Di Tebing Berbatu (sumber: pexels.com) Dalam era digital saat ini, keamanan aplikasi telah bergeser dari sekadar fitur tambahan menjadi prioritas utama bagi setiap software engineer. Seiring dengan serangan siber yang kian canggih, aplikasi harus dirancang secara defensif agar tangguh menghadapi berbagai ancaman. Berikut adalah panduan komprehensif untuk mengamankan aplikasi berdasarkan praktik [&hellip;]</description></oembed>
