Skip to content
The SECOND Advisories Limited
Your Trusted Cybersecurity Advisor
Home
Blog
What;s New
Contact
Resources
Cybersecurity is neither product nor solution.
It is a never-ending journey with ongoing challenges to reach the rolling target of stakeholders expectation.
Automation is everywhere, be seen or behind the scene.
Cybersecurity becomes everyone's concern and therefore everyone's responsibility.
Critical Infrastructure Failure Has High Impact.
They must be secured to maintain reliable services.
Systems are no longer deployed as islands.
They are connected and accessible anywhere, anytime, any network, any device and any platform.
And so are people getting connected.
... mostly in the cyber world, even when face-to-face.
Cloud, Social Network, IM, AI are dominating.
Demarcation of biz and non-biz use, trusted and untrusted app are diminishing.
We are living in real and cyber space.
... always exposing to threats and must follow the same risk-taking principles for cost-effective and optimal protection.
Hackers are all around.
Be vigilant and smart to avoid being victim.
Collect latest cyber threat intelligence.
But assess material impacts to specific business environment by competent cybersecurity practitioners to avoid FUD.
Prepare for the worst.
React promptly to resume services to maintain survivability.
Streamlined IR is the bottom line.
Because we don't know what threats we don't know.
Engage all levels.
Ask what you can do for cybersecurity.
Be part of the transformation.
Each of us plays a different roles to protect the cyber community.
Cybersecurity is needed for all entity size.
... as mutual protection for individual and connected neighbor.
Act now and don't wait.
Are you ready for this journey and explore with us?
Services
Provide vendor neutral cybersecurity advisories to enhance the organization cybersecurity posture Act as a trusted...
Gallery
Slipping away for a break from cybersecurity conference / event (alphabetic order). Non-Cyber – Travel
About
Founded in 2016 ... Subject Matter Expert of cybersecurity in ICT (Information and Communications Technology) and ICS (...
Shared Responsibility
I saw some awareness posters that cyber security is a shared responsibility. No doubt each of us plays a different
Policy #12
In the illustration, there is implicit EXCEPT WITH PERMIT in real life. However, the bilingual "except's" are inconsistent.The Chinese version
Ice Road
This is seasonal - only happened a short while during winter time when lake or river is frozen with thickness
Isolation #2
In pandemic disease era, facemask is a effective means to protect being infected via airborne transmission. This is usually voluntary
Design & Build #3
Earlier, I talked about similar. When conducting a comprehensive assessment of a facility, we should not just look at the
Policies #11
Policies are rules. They stipulate what are allowed and what not. Good policies must be practically achievable and enforceable, not
Emergency vs Privacy
It is common to leave contact information in passport, contact card in wallet such that under emergency situation, others could
Bag Tag
It is common practice to tag your checked bag or even hand carried bag with a tag. How are you
Renewable Energy
It is one of the decarbonization means. Investment involves initial plant setup and then recurring operating cost. There is no
Administrative Control #2
SSSS (or 4S) is Smart Site Safety System. It consists of server, workstation, mobile network, end point devices (CCTV, smart
Bunkers
Bunkers are fortified physical infrastructure to withstand attack. However, there are side channels required for supplies, reconnaissance, defense or attack
Risk Taking #2
Each one is fully responsible for the consequence by own act no matter in physical or cyber worlds. In physical
1
2
3
…
23
Next »