Banner Shadow

Services

Gallery

About

Policies must be written precisely. That said, clarity is essential or otherwise it will create dispute, confusion in policy enforcement,
Protocol requires proper data format and valid ranges in different preset fields per design to work properly. Threat actors are
This is relatively speaking. Freedom is granted to certain extend. In physical world, what stops us doing bad things? It's
In physical world, warning sign is to alert you in keeping you safe. In cyber world, warning message might be
Other than controls must be enforceable, controls must also be robust because a defeated control will be an access gateway
Typical security objectives of cybersecurity are confidentiality, integrity and availability. It's just how they are prioritized in dealing with different
In physical world, an architect is "a person whose job is to design new buildings and make certain that they
We heard about DNS poisonong, search engine poisoning, ARP poisoning etc. With the rise of AI, data poisonings is evolved.
Digitalization needs things connected to deliver the business outcome. Without network, not much or even none can be achieved. And
Setting up a written directive (policy statement) is easy. But the actual value of a policy statement is to achieve
Some cybersecurity practitioners always mention network diagram to have cybersecurity architecture for review and so-called approval. They know just the
Our physical world is fully integrated with the cyber world. Some derivatives like privacy, digital asset, cyber protection are of