Skip to content
The SECOND Advisories Limited
Your Trusted Cybersecurity Advisor
Home
Blog
What;s New
Contact
Resources
Cybersecurity is neither product nor solution.
It is a never-ending journey with ongoing challenges to reach the rolling target of stakeholders expectation.
Automation is everywhere, be seen or behind the scene.
Cybersecurity becomes everyone's concern and therefore everyone's responsibility.
Critical Infrastructure Failure Has High Impact.
They must be secured to maintain reliable services.
Systems are no longer deployed as islands.
They are connected and accessible anywhere, anytime, any network, any device and any platform.
And so are people getting connected.
... mostly in the cyber world, even when face-to-face.
Cloud, Social Network, IM, AI are dominating.
Demarcation of biz and non-biz use, trusted and untrusted app are diminishing.
We are living in real and cyber space.
... always exposing to threats and must follow the same risk-taking principles for cost-effective and optimal protection.
Hackers are all around.
Be vigilant and smart to avoid being victim.
Collect latest cyber threat intelligence.
But assess material impacts to specific business environment by competent cybersecurity practitioners to avoid FUD.
Prepare for the worst.
React promptly to resume services to maintain survivability.
Streamlined IR is the bottom line.
Because we don't know what threats we don't know.
Engage all levels.
Ask what you can do for cybersecurity.
Be part of the transformation.
Each of us plays a different roles to protect the cyber community.
Cybersecurity is needed for all entity size.
... as mutual protection for individual and connected neighbor.
Act now and don't wait.
Are you ready for this journey and explore with us?
Services
Provide vendor neutral cybersecurity advisories to enhance the organization cybersecurity posture Act as a trusted...
Gallery
Slipping away for a break from cybersecurity conference / event (alphabetic order). Non-Cyber – Travel
About
Founded in 2016 ... Subject Matter Expert of cybersecurity in ICT (Information and Communications Technology) and ICS (...
Off Grid
Our physical world is fully integrated with the cyber world. Some derivatives like privacy, digital asset, cyber protection are of
Twins
Ditigal Twin is a digital representation of a physical object, person, or process, contextualized in a digital environment. There are
Security Culture
A trivial observation will reveal a lot of issues about the security culture of an organization. 1. Does the organization:
United
Combat against cyber threats relies on everyone. Together, determined group of individuals will become strong. Then, what about cybersecurity practitioners.
Tunnel #3
TLS is breakable. Similar post is here. This is normally done at the Internet gateway. Anything flowing thru the tunnel
Integrity
Here, I am not talking about the fundamental of information security, the CIA aspects. Most often, we trust the policy
ZTNA
Zero Trust Network Access (ZTNA) is suddenly becoming eye-catching in ICT. No doubt, this will enhance cybersecurity as untrusted by
Trust #3
Driving on the road is risky in the physical world. The worst consequence is fatality. There are life-saving measures like
Policy and Usability #2
For regions driving on the left, driver seat in the vehicle is on the right. If this policy is blindly
Policy and Usability
I came across certain cybersecurity practitioners who are obsessive with technical controls and insist a strict binary decision in determining
Safety and Cybersecurity
In any field work, safety is the most important thing. Yet, we cannot totally eliminate the likelihood of fatality no
Container or Content
When installing controls, you have to understand what is the protection objective. Don't just apply textbook knowledge for the sake
« Previous
1
2
3
4
5
6
…
23
Next »