Skip to content
The SECOND Advisories Limited
Your Trusted Cybersecurity Advisor
Home
Blog
What;s New
Contact
Resources
Cybersecurity is neither product nor solution.
It is a never-ending journey with ongoing challenges to reach the rolling target of stakeholders expectation.
Automation is everywhere, be seen or behind the scene.
Cybersecurity becomes everyone's concern and therefore everyone's responsibility.
Critical Infrastructure Failure Has High Impact.
They must be secured to maintain services.
Systems are no longer deployed as islands.
They are connected and accessible anywhere, anytime, any platform.
And so are people getting connected.
... mostly in the cyber world, even when face-to-face.
Cloud, Social Network, IM are dominating.
Demarcation of business and non-business uses is diminishing.
We are living in real and cyber space.
... exposing to the same threats and must follow the same protocols and protection measures.
Hackers are all around.
Be vigilant and smart to avoid being victim.
Collect latest threat intelligence.
But assess impact to avoid FUD
Prepare for the worst.
React promptly to resume services to maintain survivability.
Streamlined IR is the bottom line.
As we don't know what threats we don't know
Be part of the transformation.
Each of us plays a different roles to protect the cyber community.
Cybersecurity needs ... entity size doesn't matter.
... as mutual protection for individual and connected neighbor
Act now and don't wait.
Are you ready for this journey and explore with us?
Services
Provide vendor neutral cybersecurity advisories to enhance the organization cybersecurity posture Act as a trusted...
Gallery
Slipping away for a break from cybersecurity conference / event (alphabetic order). Non-Cyber – Travel
About
Founded in 2016 ... Subject Matter Expert of cybersecurity in ICT (Information and Communications Technology) and ICS (...
Information Security
It is the early term in this domain. It covers everything under the sun regarding information.As time goes by, information
Policy #10
In an organization, policy affects the culture and work practices. A good policy is practically achievable, acceptable and having buy-in
Infected
A leaft in a plant is infected. Saving the plant should contain and neutralize the infected from spreading to other
Architecture
ICS now totally utilitizes general computing equipment (server, workstatiom, OS, DB, communication) rather than developing own C&I. Therefore, OEM has
Improper Control #2
Technical control is just one of the security measures. There are much surrounding elements to take care in order to
Policy Making
For certain job roles of cybersecurity practitioners, policy making is necessary as a foundation in running the business securely to
Stepping Stone #2
Jump hosts are typical used for remote access. These are controls: User accounts with multi-factor authenticationTime of day granted to
Access Control #4
From technology point of view of a discrete control, opening the bridge will disconnect the traffic across the sides. Is
Support Model
Like any other information processing solutions, cyber protection technologies require ongoing support and maintenance to sustain their effectiveness. Otherwise, the
Physics #2
This is another great example to think deeper to balance cyber and physical world rather than just blindly putting unnecessary
Seasonal Factor #2
Anomalies detection highlights the technology will learn your environment as baseline reference such that "unusual" traffic will be flagged for
Physics
Some cybersecurity practitioners just narrow-focus on the cyber aspects. It is no surprise given that the IT cyber space is
1
2
3
…
19
Next »