A deployed function looks not elegant. Is this due to design problem, or deployment is not in accordance to the
When designing security controls, it is necessary to determine if the controls can be executed effectively. Somehow due to unexpected
Roads connect different destinations in physical world. Every road user (vehicle or any kind, pedestrian or live objects) has to
The cyber world is built up by connecting different systems and devices via information highway. Therefore, the key cybersecurity element
To run a business, there are always business risks. It is a matter of how much risk acceptance is comfortable.
In physical world, this creates uncertainties for moving forward. In the cyber world, this means even more. From business perspective,
Controlling cyber (or network) access is always a main concern to limit threat vectors for lateral movement once they have
It's the secret to access your protected resources in the network, or the cyber space. Therefore, you have to keep
Privacy is a major concern nowadays. Sensitive info need to be tokenized or masked while leaving functional info unchanged during
Cyber Security practitioners need to acquire relevant certification or credential in demonstrating domain expertise or competency. Learning is life time
We heard a lot to have frequent backup as mitigation measure to recover system from attack, most likely from ransomware.
Like in physical world, automation components do have life time. Example is mechanical attributes of traditional hard disk drive, they