Skip to content
The SECOND Advisories Limited
Your Trusted Cybersecurity Advisor
Home
Blog
What;s New
Contact
Resources
Cybersecurity is neither product nor solution.
It is a never-ending journey with ongoing challenges to reach the rolling target of stakeholders expectation.
Automation is everywhere, be seen or behind the scene.
Cybersecurity becomes everyone's concern and therefore everyone's responsibility.
Critical Infrastructure Failure Has High Impact.
They must be secured to maintain reliable services.
Systems are no longer deployed as islands.
They are connected and accessible anywhere, anytime, any network, any device and any platform.
And so are people getting connected.
... mostly in the cyber world, even when face-to-face.
Cloud, Social Network, IM, AI are dominating.
Demarcation of biz and non-biz use, trusted and untrusted app are diminishing.
We are living in real and cyber space.
... always exposing to threats and must follow the same risk-taking principles for cost-effective and optimal protection.
Hackers are all around.
Be vigilant and smart to avoid being victim.
Collect latest cyber threat intelligence.
But assess material impacts to specific business environment by competent cybersecurity practitioners to avoid FUD.
Prepare for the worst.
React promptly to resume services to maintain survivability.
Streamlined IR is the bottom line.
Because we don't know what threats we don't know.
Engage all levels.
Ask what you can do for cybersecurity.
Be part of the transformation.
Each of us plays a different roles to protect the cyber community.
Cybersecurity is needed for all entity size.
... as mutual protection for individual and connected neighbor.
Act now and don't wait.
Are you ready for this journey and explore with us?
Services
Provide vendor neutral cybersecurity advisories to enhance the organization cybersecurity posture Act as a trusted...
Gallery
Slipping away for a break from cybersecurity conference / event (alphabetic order). Non-Cyber – Travel
About
Founded in 2016 ... Subject Matter Expert of cybersecurity in ICT (Information and Communications Technology) and ICS (...
Aurora
In physical world, it is beautiful scenery. In cyber world, Aurora vulnerability refers cyber attack resulting into damage of physical
Crowdsourcing
Landlord: "Tell me your monthly sales amount." Tenant: "No way, this is confidential business information." With a little trick, such
Grade of Protection #2
Certain hotels provide safe for customers storing valuables during their stay. It is somewhat physically robust from brute force opening
Resilience
How much resilience is sufficient: single, dual, triple, quadruple or more? You need to understand what is the consequence of
Perimeter
The key difference between physical and cyber perimeters is visibility. To augment physical perimeter limitations, surveillance cameras (probably with video
Boundary
Typically, the boundary defines a clear demarcation of accountability in the case of ICT or ICS system landscape. It also
Mistaken Identity
This is to attack trust based on some one you know. In physical world, this is harder as you will
Access Control
In physical world, access control is done by certain barrier that this barrier will be disabled for entry by authenticated
Design & Build
Secure by design of ICS (Industrial Control System) is just part of the ICS life cycle. If design is insecure,
FUD
Fear, Uncertainty, Doubt (FUD) is the tactic vendors are trying to sell you their cybersecurity solution. Typically, this is done
Operation Risk
Unlike IT application, ICS (Industrial Control System) involves direct physical process that will affect human safety and impose environment impacts.
Black List, White List, Sandbox
Malware is the key attack act in the cyber space. Black list is used in anti-malware protection, anti-spam or web
« Previous
1
…
16
17
18
19
20
…
23
Next »