Banner Shadow

Services

Gallery

About

As cybersecurity practitioner, you might need to assist asset owner or end user to deal with auditor (or security assessor).
This is always a debating topic during audit or security assessment. Auditor: your control system lacks of the latest security
Continuation of this.
Continuation of this.
Continuation of this.
Most of the time, tight technical controls are deployed at infrastructure, network, platform, application or end points to address cybersecurity.
The illustrations are self-explanatory - priority will be given to protect or rectify the higher impact scenario. The hard part
To be successful in cybersecurity transformation, each one in the organization shall contribute as the baseline. Culture or politic in
Respond is 1 of the 5 domains under the NIST CyberSecurity Framework along with Identify, Protect, Detect and Recover. It
When deploying protection or counter-measure, it is necessary to understand If new risks are introduced? Will these new risks even
Due to connectivity, an insecure component will no longer just harm itself but other components in the ecosystem as well.
Organizations usually invest substantially to manage and mitigate cyber attack with the detection technologies like log correlation and SOC (Security