Deception Everything on earth has good or evil perspectives, same for deception in cyber world. We heard a lot about phishing Remove, Lock, Take We have lots of digital assets on the road, cell phone, notebook, removable storage media etc. There are stringent controls If Not Us, Who? This blog is part 2 of 2. Most of the time, people expect cybersecurity practitioners are experts to deal with If Not Now, When? It has been used in S4x13 theme. This blog is part 1 of 2. Most often, security technology sales send Treat or Trick Halloween is coming and the tradition is once annually. It is a children's custom of calling at houses at Halloween Assumption #2 (2nd topic) No matter individual or enterprise, there are information stored in the cloud. The pre-requisite to use cloud is the communication Cyber Footprint We are living both in the physical and cyber worlds and these worlds are closely coupled. We have left lots Supporting System Mostly, people put focus cybersecurity on critical infrastructure. We must not forget the cybersecurity for supporting systems are equally important Penetration Cybersecurity is becoming commodity skill and therefore same terminology will have different interpretation by different parties. Pick penetration test (pTest) Threat Hunting Suddenly, new market jargon "threat hunting" is spreading around under cybersecurity domain. It is a kind of proactive measure to Spam Everything in the world is relative. For some, spam mails are annoying and try to filter them off the mailbox Stepping Stone Systems and components are connected in the cyber space. Some have misconception that my setup are for development, or its « Previous 1 … 12 13 14 15 16 … 24 Next »