Other than controls must be enforceable, controls must also be robust because a defeated control will be an access gateway
Typical security objectives of cybersecurity are confidentiality, integrity and availability. It's just how they are prioritized in dealing with different
In physical world, an architect is "a person whose job is to design new buildings and make certain that they
We heard about DNS poisonong, search engine poisoning, ARP poisoning etc. With the rise of AI, data poisonings is evolved.
Digitalization needs things connected to deliver the business outcome. Without network, not much or even none can be achieved. And
Setting up a written directive (policy statement) is easy. But the actual value of a policy statement is to achieve
Some cybersecurity practitioners always mention network diagram to have cybersecurity architecture for review and so-called approval. They know just the
Our physical world is fully integrated with the cyber world. Some derivatives like privacy, digital asset, cyber protection are of
Ditigal Twin is a digital representation of a physical object, person, or process, contextualized in a digital environment. There are
A trivial observation will reveal a lot of issues about the security culture of an organization. 1. Does the organization:
Combat against cyber threats relies on everyone. Together, determined group of individuals will become strong. Then, what about cybersecurity practitioners.
TLS is breakable. Similar post is here. This is normally done at the Internet gateway. Anything flowing thru the tunnel