Skip to content
The SECOND Advisories Limited
Your Trusted Cybersecurity Advisor
Home
Blog
What;s New
Contact
Resources
Cybersecurity is neither product nor solution.
It is a never-ending journey with ongoing challenges to reach the rolling target of stakeholders expectation.
Automation is everywhere, be seen or behind the scene.
Cybersecurity becomes everyone's concern and therefore everyone's responsibility.
Critical Infrastructure Failure Has High Impact.
They must be secured to maintain reliable services.
Systems are no longer deployed as islands.
They are connected and accessible anywhere, anytime, any network, any device and any platform.
And so are people getting connected.
... mostly in the cyber world, even when face-to-face.
Cloud, Social Network, IM, AI are dominating.
Demarcation of biz and non-biz use, trusted and untrusted app are diminishing.
We are living in real and cyber space.
... always exposing to threats and must follow the same risk-taking principles for cost-effective and optimal protection.
Hackers are all around.
Be vigilant and smart to avoid being victim.
Collect latest cyber threat intelligence.
But assess material impacts to specific business environment by competent cybersecurity practitioners to avoid FUD.
Prepare for the worst.
React promptly to resume services to maintain survivability.
Streamlined IR is the bottom line.
Because we don't know what threats we don't know.
Engage all levels.
Ask what you can do for cybersecurity.
Be part of the transformation.
Each of us plays a different roles to protect the cyber community.
Cybersecurity is needed for all entity size.
... as mutual protection for individual and connected neighbor.
Act now and don't wait.
Are you ready for this journey and explore with us?
Services
Provide vendor neutral cybersecurity advisories to enhance the organization cybersecurity posture Act as a trusted...
Gallery
Slipping away for a break from cybersecurity conference / event (alphabetic order). Non-Cyber – Travel
About
Founded in 2016 ... Subject Matter Expert of cybersecurity in ICT (Information and Communications Technology) and ICS (...
Trust #4
A machine in the corner of the mall for digital currency exchange. Whether you use it or not is a
Physics #3
In automation world, cyber components control the machinery or the physical portion. Examples of machinery are turbine, passenger lift, vehicle,
Clarity
Policies must be written precisely. That said, clarity is essential or otherwise it will create dispute, confusion in policy enforcement,
Protocol
Protocol requires proper data format and valid ranges in different preset fields per design to work properly. Threat actors are
Freedom
This is relatively speaking. Freedom is granted to certain extend. In physical world, what stops us doing bad things? It's
Warning Message #2
In physical world, warning sign is to alert you in keeping you safe. In cyber world, warning message might be
Defeated Control #2
Other than controls must be enforceable, controls must also be robust because a defeated control will be an access gateway
Availability
Typical security objectives of cybersecurity are confidentiality, integrity and availability. It's just how they are prioritized in dealing with different
Architect
In physical world, an architect is "a person whose job is to design new buildings and make certain that they
Poisoning
We heard about DNS poisonong, search engine poisoning, ARP poisoning etc. With the rise of AI, data poisonings is evolved.
Network #2
Digitalization needs things connected to deliver the business outcome. Without network, not much or even none can be achieved. And
Enforcement #5
Setting up a written directive (policy statement) is easy. But the actual value of a policy statement is to achieve
« Previous
1
2
3
4
…
22
Next »