When writing policies, positive logic shall be adopted. It eases readers understand what is allowed rather than spending time to
We have a lot of personal data exposed in the cyber world in our daily life. To name a few,
Confidential information is costly to maintain. Imagine all the 3 data states (data-in-motion, data-at-rest, data-in-use) will require technology and the
This is widely adopted in various process like: Asset discovery: to scan the network and take inventory of the components
Worry about breaching GDPR or PCIDSS? The most effective means is to avoid capturing these info that need protection. Accepting
At certain situations, enforcement of policy relies on administrative control when technical controls are not feasible. But how do we
Durnig pandemic situation, InfraRed body temperature detection technology is great - contactless, accurate, multi-persons processing, seamlessly and transparent to customers.
Two lanes but 3 traffic signs. Is the middle lane hidden? Information concealment is one of the techniques to hide
In physical world, it is a geographical critical and strategic passage. Armed force is able to control what is allowed
GRC is the typical jargon when we talk about the cybersecurity posture in an organization. Risks, no matter in terms
The commodities (toys) are encapsulated in the vending machine (plastic containers). All containers share the same Point of Sales (PoS)
We face many "policies" (directives) everyday - whether in real world or in the cyber space. And we are told