Tunnel #3 TLS is breakable. Similar post is here. This is normally done at the Internet gateway. Anything flowing thru the tunnel Integrity Here, I am not talking about the fundamental of information security, the CIA aspects. Most often, we trust the policy ZTNA Zero Trust Network Access (ZTNA) is suddenly becoming eye-catching in ICT. No doubt, this will enhance cybersecurity as untrusted by Trust #3 Driving on the road is risky in the physical world. The worst consequence is fatality. There are life-saving measures like Policy and Usability #2 For regions driving on the left, driver seat in the vehicle is on the right. If this policy is blindly Policy and Usability I came across certain cybersecurity practitioners who are obsessive with technical controls and insist a strict binary decision in determining Safety and Cybersecurity In any field work, safety is the most important thing. Yet, we cannot totally eliminate the likelihood of fatality no Container or Content When installing controls, you have to understand what is the protection objective. Don't just apply textbook knowledge for the sake Dual Home Certain cybersecurity practitioners have no knowledge of the implication when writing policy statement even with help from external subject matter FUD #2 Things outside your comfort zone or knowledge will generate FUD. There are always news exaggreating cyber risks causing severe consequence Patches One of the key activities in cybersecurity is to deploy security patches on regular basis. This is intended to upkeep Consequence Certain cybersecurity practitioners are obsessive on technical controls. They overlook the consequence due to cyber or other non-cyber causes will 1 2 3 … 20 Next »