Jump hosts are typical used for remote access. These are controls: User accounts with multi-factor authenticationTime of day granted to
From technology point of view of a discrete control, opening the bridge will disconnect the traffic across the sides. Is
Like any other information processing solutions, cyber protection technologies require ongoing support and maintenance to sustain their effectiveness. Otherwise, the
This is another great example to think deeper to balance cyber and physical world rather than just blindly putting unnecessary
Anomalies detection highlights the technology will learn your environment as baseline reference such that "unusual" traffic will be flagged for
Some cybersecurity practitioners just narrow-focus on the cyber aspects. It is no surprise given that the IT cyber space is
A clear directive (warning on usage) is required to keep human safe. This is the most effective safety protection. After
Everything is now undergoing digital transformation residing in the cyber space. Certain cybersecurity practitioners I met are overkilling business operations
By common sense, systems isolated from the network will have immunity from cyber attack over the wire but still be
Older TLS (Transport Layer Security) version is marked insecure by vulnerability scanner. Certain cybersecurity practitioners make decision solely based on
Security technology alone cannot reassure protection. It requires human judgment: What is the value of target being protected? Risks to
Many cybersecurity practitioners has misconception that technical controls are means to secure the cyber environment. They insist for encryption, MFA,