Banner Shadow

Services

Gallery

About

Controlling cyber (or network) access is always a main concern to limit threat vectors for lateral movement once they have
It's the secret to access your protected resources in the network, or the cyber space. Therefore, you have to keep
Privacy is a major concern nowadays. Sensitive info need to be tokenized or masked while leaving functional info unchanged during
Cyber Security practitioners need to acquire relevant certification or credential in demonstrating domain expertise or competency. Learning is life time
We heard a lot to have frequent backup as mitigation measure to recover system from attack, most likely from ransomware.
Like in physical world, automation components do have life time. Example is mechanical attributes of traditional hard disk drive, they
This is largely based on preception and trust. How do I trust if the infrastructure or system is secure? We
Keeping social distance is recommended to avoid virus infection of COVID-19 attack. Similarly, cyber distance takes the same concept to
We can't have 100% secure solution in the course of business. We need to evalate risk and reduce to acceptable
If you are asked to formulate corporate cybersecurity policies, here are some advices: Identify key stake holders that will be
Security function of the business or physical process is protected by security system. Specific security system for the latter is
Secure process by design should be secure if operated according to prescribed scenarios. Passenger screening for human and hand-carried items