Setting up a written directive (policy statement) is easy. But the actual value of a policy statement is to achieve
Some cybersecurity practitioners always mention network diagram to have cybersecurity architecture for review and so-called approval. They know just the
Our physical world is fully integrated with the cyber world. Some derivatives like privacy, digital asset, cyber protection are of
Ditigal Twin is a digital representation of a physical object, person, or process, contextualized in a digital environment. There are
A trivial observation will reveal a lot of issues about the security culture of an organization. 1. Does the organization:
Combat against cyber threats relies on everyone. Together, determined group of individuals will become strong. Then, what about cybersecurity practitioners.
TLS is breakable. Similar post is here. This is normally done at the Internet gateway. Anything flowing thru the tunnel
Here, I am not talking about the fundamental of information security, the CIA aspects. Most often, we trust the policy
Zero Trust Network Access (ZTNA) is suddenly becoming eye-catching in ICT. No doubt, this will enhance cybersecurity as untrusted by
Driving on the road is risky in the physical world. The worst consequence is fatality. There are life-saving measures like
For regions driving on the left, driver seat in the vehicle is on the right. If this policy is blindly
I came across certain cybersecurity practitioners who are obsessive with technical controls and insist a strict binary decision in determining