Expect the Unexpected The network anomalies detection suddenly becomes a popular topic in cyber protection market. This is to expect something unexpected then Improper Usage Park your car at a legitimate parking lot in the street. What's wrong? Even it is a legitimate parking zone, CONFIDENTIAL? People talk about leaking company CONFIDENTIAL information. It is not just a word slipped from your mouth to blame your Life Cycle Management Protection measures won't last long. They are secure at time of deployment but deteriorates or becomes obsolescence some days later. Masquerade Bison is masqueraded as swan. This is a typical trick in social engineering attack. That's why scams in social network, Control The general belief is that security technologies will secure the asset. Make sure the controls are designed, deployed and sustained Policies Setting up a policy is easy. Whether it is practically doable is a matter of enforcement that is the biggest Site Migration I have sourced site hosting plan but I have difficulties to migrate the previous posts. Therefore, I am re-posting them « Previous 1 … 20 21 22