In any field work, safety is the most important thing. Yet, we cannot totally eliminate the likelihood of fatality no
When installing controls, you have to understand what is the protection objective. Don't just apply textbook knowledge for the sake
Certain cybersecurity practitioners have no knowledge of the implication when writing policy statement even with help from external subject matter
Things outside your comfort zone or knowledge will generate FUD. There are always news exaggreating cyber risks causing severe consequence
One of the key activities in cybersecurity is to deploy security patches on regular basis. This is intended to upkeep
Certain cybersecurity practitioners are obsessive on technical controls. They overlook the consequence due to cyber or other non-cyber causes will
It is the early term in this domain. It covers everything under the sun regarding information.As time goes by, information
In an organization, policy affects the culture and work practices. A good policy is practically achievable, acceptable and having buy-in
A leaft in a plant is infected. Saving the plant should contain and neutralize the infected from spreading to other
ICS now totally utilitizes general computing equipment (server, workstatiom, OS, DB, communication) rather than developing own C&I. Therefore, OEM has
Technical control is just one of the security measures. There are much surrounding elements to take care in order to
For certain job roles of cybersecurity practitioners, policy making is necessary as a foundation in running the business securely to