Banner Shadow

Services

Gallery

About

1. Use case Authenticate the user of parking is "Aliens" status, a yes/no decisionGrant usage durationDisclaim loss/damage responsibilities 2. Enforcement
Proper cybersecurity in an organization must have a foundation. The effective approach is driven from the top to mandate integration
This is a popular topic in Board Room too.  No matter how much cyber protection technologies are invested and deployed,
Road system in physical world is designed for safe (secure) use - sign board, speed limit, road shoulder, proper lane
Each house has its own perimeter to control entry.  However behind the perimeter, they are mutually accessible at the back
It's about attack and defense in the cyber space. In early days, breaking login is via password brute force attack
We are really living in the cyber era.  From early childhood, kids will touch on device, get connected or even
Tag or label is an important aspect to document cyber assets like hardware components or cabling. This is not an
Access control is intended to allow only authorized subject to reach the protected resources. A comprehensive assessment including penetration test
Earlier, I talked about network anomaly detection. It is the kind of technology based on the past activities to predict
Everyday, we rely so much on automation ... be seen or behind the scene: rice cooker, temperature control of air
As if in physical world, mutual support and care are important to maintain safety in the cyber world. Unlike physical