Technical control is just one of the security measures. There are much surrounding elements to take care in order to
For certain job roles of cybersecurity practitioners, policy making is necessary as a foundation in running the business securely to
Jump hosts are typical used for remote access. These are controls: User accounts with multi-factor authenticationTime of day granted to
From technology point of view of a discrete control, opening the bridge will disconnect the traffic across the sides. Is
Like any other information processing solutions, cyber protection technologies require ongoing support and maintenance to sustain their effectiveness. Otherwise, the
This is another great example to think deeper to balance cyber and physical world rather than just blindly putting unnecessary
Anomalies detection highlights the technology will learn your environment as baseline reference such that "unusual" traffic will be flagged for
Some cybersecurity practitioners just narrow-focus on the cyber aspects. It is no surprise given that the IT cyber space is
A clear directive (warning on usage) is required to keep human safe. This is the most effective safety protection. After
Everything is now undergoing digital transformation residing in the cyber space. Certain cybersecurity practitioners I met are overkilling business operations
By common sense, systems isolated from the network will have immunity from cyber attack over the wire but still be
Older TLS (Transport Layer Security) version is marked insecure by vulnerability scanner. Certain cybersecurity practitioners make decision solely based on