Banner Shadow

Services

Gallery

About

Email becomes part of our life in both cyber and physical worlds.  We execute actions in physical world based on
Service availability expectation is high nowadays.  Customers expect everything is always up and running any time for usability. Backup for
Mouse over on the hyperlink will show you the intended web address to reach. Traditionally, this is used to understand
You cannot tell because it lacks of reference - time of day taken or more precisely which planet but generally
Are you kidding?  Yes, there is.  These computers are 100% secure from cyber-attack, but ... What about physical threat? Are
Controls are necessary to reduce likelihood of risks.  But excessive controls shall have adverse effects: Degrade productivity Push back from
We all know the importance of privacy and the need to protect it. While protecting privacy, we need to look
Gartner defines Shadow IT as IT devices, software and services outside the ownership or control of (IT) organizations. Given that information
As cybersecurity practitioner, you might need to assist asset owner or end user to deal with auditor (or security assessor).
This is always a debating topic during audit or security assessment. Auditor: your control system lacks of the latest security
Continuation of this.
Continuation of this.