Skip to content

The SECOND Advisories Limited

Your Trusted Cybersecurity Advisor

  • Home
    • Blog
    • What;s New
    • Contact
    • Resources

Category: Technology

Control

1st September 20186th September 2018 By cliangNo Comments
The general belief is that security technologies will secure the asset. Make sure the controls are designed, deployed and sustained properly. Control weakness might be uncovered via security assessment, penetration test or peer review....
Read More
TechnologyProtect

Site Migration

1st September 20187th September 2018 By cliangNo Comments
I have sourced site hosting plan but I have difficulties to migrate the previous posts.  Therefore, I am re-posting them again gradually....
Read More
TechnologyIdentify

Posts navigation

Previous 1 … 12 13

Recent Posts

  • Obsolescence
  • Treat or Trick #2
  • Purpose of Control #2
  • Access Path
  • Control #4

Archives

Categories

  • People
  • Policies
  • Process
  • Technology
Site Info
  • Gallery
  • Disclaimer
  • Privacy
  • Copyright
Recent Posts
  • Obsolescence
  • Treat or Trick #2
  • Purpose of Control #2
  • Access Path
Categories
  • People (101)
  • Policies (99)
  • Process (107)
  • Technology (122)
Tags
Detect Governance Identify Protect Recover Respond
© 2018-2024 The SECOND Advisories Limited. All rights reserved.