Banner Shadow

Services

Gallery

About

DMZ becomes the de facto standard for network segmentation. It is used to control network traffic across trust and untrusted
Sometimes, security protection needs reinforcement to avoid deterioration of effectiveness over time. This can easily be visualized in real world.
Enforcement Having policy as written document isn't enough. If there is violation, it must be enforced thru correctional approach. In
When we develop written directive, there might be chance that certain elements are assumed and be implicit. It is essential
I have seen cybersecurity directive regarding applicability is to protect OT (Operational Technology) system so as to minimize cyber attacks
Some cybersecurity practitioners only drill down to the level of details of network diagram or even wiring diagram to identify
In policy development, it is essential the coverage of the rule is sufficient and precise to avoid ambiguity. A living
It is common to see such directive in subway, airport, key facilities, incident respond playbook etc. The problem is different
When designing controls, we must understand what to protect. There might be blind spot that the intended controls are ineffective
The illustrated directive is unclear. Drone, also known as unmanned aerial vehicle, has different form factors. If the sign comes
Early days in the industry, we are talking about information security to protect the information so as to minimize the
Sometimes, a small mistake will invite question if the information processing facilities are producing accurate result without malicious tempering. The