Skip to content

The SECOND Advisories Limited

Your Trusted Cybersecurity Advisor

  • Home
    • Blog
    • What;s New
    • Contact
    • Resources

Author: cliang

https://www.youracclaim.com/user/charles-liang

Control

1st September 20186th September 2018 By cliangNo Comments
The general belief is that security technologies will secure the asset. Make sure the controls are designed, deployed and sustained properly. Control weakness might be uncovered via security assessment, penetration test or peer review....
Read More
TechnologyProtect

Policies

1st September 20186th September 2018 By cliangNo Comments
Setting up a policy is easy.  Whether it is practically doable is a matter of enforcement that is the biggest challenge especially when exception to policies can be manipulated....
Read More
PoliciesIdentify

Site Migration

1st September 20187th September 2018 By cliangNo Comments
I have sourced site hosting plan but I have difficulties to migrate the previous posts.  Therefore, I am re-posting them again gradually....
Read More
TechnologyIdentify

Posts navigation

Previous 1 … 28 29

Recent Posts

  • Protection
  • Remote Control
  • Anomaly
  • Obsolescence
  • Treat or Trick #2

Archives

Categories

  • People
  • Policies
  • Process
  • Technology
Site Info
  • Gallery
  • Disclaimer
  • Privacy
  • Copyright
Recent Posts
  • Protection
  • Remote Control
  • Anomaly
  • Obsolescence
Categories
  • People (101)
  • Policies (102)
  • Process (108)
  • Technology (123)
Tags
Detect Governance Identify Protect Recover Respond
© 2018-2024 The SECOND Advisories Limited. All rights reserved.