Banner Shadow

Services

Gallery

About

A machine in the corner of the mall for digital currency exchange. Whether you use it or not is a
In automation world, cyber components control the machinery or the physical portion. Examples of machinery are turbine, passenger lift, vehicle,
Policies must be written precisely. That said, clarity is essential or otherwise it will create dispute, confusion in policy enforcement,
Protocol requires proper data format and valid ranges in different preset fields per design to work properly. Threat actors are
This is relatively speaking. Freedom is granted to certain extend. In physical world, what stops us doing bad things? It's
In physical world, warning sign is to alert you in keeping you safe. In cyber world, warning message might be
Other than controls must be enforceable, controls must also be robust because a defeated control will be an access gateway
Typical security objectives of cybersecurity are confidentiality, integrity and availability. It's just how they are prioritized in dealing with different
In physical world, an architect is "a person whose job is to design new buildings and make certain that they
We heard about DNS poisonong, search engine poisoning, ARP poisoning etc. With the rise of AI, data poisonings is evolved.
Digitalization needs things connected to deliver the business outcome. Without network, not much or even none can be achieved. And
Setting up a written directive (policy statement) is easy. But the actual value of a policy statement is to achieve