One of the fundamental principles in cybersecurity is to apply necessary controls to reduce business impact. Business value is the
Cautious - understand cybersecurity is important but need to explore how to execute or manage Conformance - doing things adhere
In physical world, likelihood is based on historical frequencies, scientific calculation like path of hurricane, engineering specification such as MTBF
  When we consider business continuity especially service resumption, we need to look at the supply chain for the entire
Cybersecurity and convenience are always contradictory.  The Touch ID is a convenient means to unlock the device and deemed secure
One of the roles in cybersecurity practitioner is to share threat intelligence with internal stakeholders to enhance the situation awareness.
The network anomalies detection suddenly becomes a popular topic in cyber protection market.  This is to expect something unexpected then
Park your car at a legitimate parking lot in the street. What's wrong? Even it is a legitimate parking zone,
People talk about leaking company CONFIDENTIAL information.  It is not just a word slipped from your mouth to blame your
Protection measures won't last long.  They are secure at time of deployment but deteriorates or becomes obsolescence some days later. 
Bison is masqueraded as swan. This is a typical trick in social engineering attack.  That's why scams in social network,
The general belief is that security technologies will secure the asset. Make sure the controls are designed, deployed and sustained