Skip to content
The SECOND Advisories Limited
Your Trusted Cybersecurity Advisor
Home
Blog
What;s New
Contact
Resources
Cybersecurity is neither product nor solution.
It is a never-ending journey with ongoing challenges to reach the rolling target of stakeholders expectation.
Automation is everywhere, be seen or behind the scene.
Cybersecurity becomes everyone's concern and therefore everyone's responsibility.
Critical Infrastructure Failure Has High Impact.
They must be secured to maintain reliable services.
Systems are no longer deployed as islands.
They are connected and accessible anywhere, anytime, any network, any device and any platform.
And so are people getting connected.
... mostly in the cyber world, even when face-to-face.
Cloud, Social Network, IM, AI are dominating.
Demarcation of biz and non-biz use, trusted and untrusted app are diminishing.
We are living in real and cyber space.
... always exposing to threats and must follow the same risk-taking principles for cost-effective and optimal protection.
Hackers are all around.
Be vigilant and smart to avoid being victim.
Collect latest cyber threat intelligence.
But assess material impacts to specific business environment by competent cybersecurity practitioners to avoid FUD.
Prepare for the worst.
React promptly to resume services to maintain survivability.
Streamlined IR is the bottom line.
Because we don't know what threats we don't know.
Engage all levels.
Ask what you can do for cybersecurity.
Be part of the transformation.
Each of us plays a different roles to protect the cyber community.
Cybersecurity is needed for all entity size.
... as mutual protection for individual and connected neighbor.
Act now and don't wait.
Are you ready for this journey and explore with us?
Services
Provide vendor neutral cybersecurity advisories to enhance the organization cybersecurity posture Act as a trusted...
Gallery
Slipping away for a break from cybersecurity conference / event (alphabetic order). Non-Cyber – Travel
About
Founded in 2016 ... Subject Matter Expert of cybersecurity in ICT (Information and Communications Technology) and ICS (...
Dual Home
Certain cybersecurity practitioners have no knowledge of the implication when writing policy statement even with help from external subject matter
FUD #2
Things outside your comfort zone or knowledge will generate FUD. There are always news exaggreating cyber risks causing severe consequence
Patches
One of the key activities in cybersecurity is to deploy security patches on regular basis. This is intended to upkeep
Consequence
Certain cybersecurity practitioners are obsessive on technical controls. They overlook the consequence due to cyber or other non-cyber causes will
Information Security
It is the early term in this domain. It covers everything under the sun regarding information.As time goes by, information
Policy #10
In an organization, policy affects the culture and work practices. A good policy is practically achievable, acceptable and having buy-in
Infected
A leaft in a plant is infected. Saving the plant should contain and neutralize the infected from spreading to other
Architecture
ICS now totally utilitizes general computing equipment (server, workstatiom, OS, DB, communication) rather than developing own C&I. Therefore, OEM has
Improper Control #2
Technical control is just one of the security measures. There are much surrounding elements to take care in order to
Policy Making
For certain job roles of cybersecurity practitioners, policy making is necessary as a foundation in running the business securely to
Stepping Stone #2
Jump hosts are typical used for remote access. These are controls: User accounts with multi-factor authenticationTime of day granted to
Access Control #4
From technology point of view of a discrete control, opening the bridge will disconnect the traffic across the sides. Is
« Previous
1
…
3
4
5
6
7
…
23
Next »