Skip to content
The SECOND Advisories Limited
Your Trusted Cybersecurity Advisor
Home
Blog
What;s New
Contact
Resources
Cybersecurity is neither product nor solution.
It is a never-ending journey with ongoing challenges to reach the rolling target of stakeholders expectation.
Automation is everywhere, be seen or behind the scene.
Cybersecurity becomes everyone's concern and therefore everyone's responsibility.
Critical Infrastructure Failure Has High Impact.
They must be secured to maintain reliable services.
Systems are no longer deployed as islands.
They are connected and accessible anywhere, anytime, any network, any device and any platform.
And so are people getting connected.
... mostly in the cyber world, even when face-to-face.
Cloud, Social Network, IM, AI are dominating.
Demarcation of biz and non-biz use, trusted and untrusted app are diminishing.
We are living in real and cyber space.
... always exposing to threats and must follow the same risk-taking principles for cost-effective and optimal protection.
Hackers are all around.
Be vigilant and smart to avoid being victim.
Collect latest cyber threat intelligence.
But assess material impacts to specific business environment by competent cybersecurity practitioners to avoid FUD.
Prepare for the worst.
React promptly to resume services to maintain survivability.
Streamlined IR is the bottom line.
Because we don't know what threats we don't know.
Engage all levels.
Ask what you can do for cybersecurity.
Be part of the transformation.
Each of us plays a different roles to protect the cyber community.
Cybersecurity is needed for all entity size.
... as mutual protection for individual and connected neighbor.
Act now and don't wait.
Are you ready for this journey and explore with us?
Services
Provide vendor neutral cybersecurity advisories to enhance the organization cybersecurity posture Act as a trusted...
Gallery
Slipping away for a break from cybersecurity conference / event (alphabetic order). Non-Cyber – Travel
About
Founded in 2016 ... Subject Matter Expert of cybersecurity in ICT (Information and Communications Technology) and ICS (...
Enforcement #2
Durnig pandemic situation, InfraRed body temperature detection technology is great - contactless, accurate, multi-persons processing, seamlessly and transparent to customers.
Concealment
Two lanes but 3 traffic signs. Is the middle lane hidden? Information concealment is one of the techniques to hide
Choke Point
In physical world, it is a geographical critical and strategic passage. Armed force is able to control what is allowed
Governance, Risk & Compliance
GRC is the typical jargon when we talk about the cybersecurity posture in an organization. Risks, no matter in terms
Grade of Protection #3
The commodities (toys) are encapsulated in the vending machine (plastic containers). All containers share the same Point of Sales (PoS)
Policy #8
We face many "policies" (directives) everyday - whether in real world or in the cyber space. And we are told
DeMilitarized Zone (DMZ)
DMZ becomes the de facto standard for network segmentation. It is used to control network traffic across trust and untrusted
Reinforcement
Sometimes, security protection needs reinforcement to avoid deterioration of effectiveness over time. This can easily be visualized in real world.
Enforcement
Enforcement Having policy as written document isn't enough. If there is violation, it must be enforced thru correctional approach. In
Assumption #3
When we develop written directive, there might be chance that certain elements are assumed and be implicit. It is essential
Taxonomy #2
I have seen cybersecurity directive regarding applicability is to protect OT (Operational Technology) system so as to minimize cyber attacks
Landscape
Some cybersecurity practitioners only drill down to the level of details of network diagram or even wiring diagram to identify
« Previous
1
…
8
9
10
11
12
…
23
Next »