Give and Take Cybersecurity and convenience are always contradictory. The Touch ID is a convenient means to unlock the device and deemed secure Router or DPI? One of the roles in cybersecurity practitioner is to share threat intelligence with internal stakeholders to enhance the situation awareness. Expect the Unexpected The network anomalies detection suddenly becomes a popular topic in cyber protection market. This is to expect something unexpected then Improper Usage Park your car at a legitimate parking lot in the street. What's wrong? Even it is a legitimate parking zone, CONFIDENTIAL? People talk about leaking company CONFIDENTIAL information. It is not just a word slipped from your mouth to blame your Life Cycle Management Protection measures won't last long. They are secure at time of deployment but deteriorates or becomes obsolescence some days later. Masquerade Bison is masqueraded as swan. This is a typical trick in social engineering attack. That's why scams in social network, Control The general belief is that security technologies will secure the asset. Make sure the controls are designed, deployed and sustained Policies Setting up a policy is easy. Whether it is practically doable is a matter of enforcement that is the biggest Site Migration I have sourced site hosting plan but I have difficulties to migrate the previous posts. Therefore, I am re-posting them « Previous 1 … 20 21 22