Banner Shadow

Services

Gallery

About

This time, I talk about auditor instead of cybersecurity practitioner that I have come across. In an ICS audit, auditor
Politics are always incurred in work and culture of an organizations especially large one. Cybersecurity becomes a hot topic and
When you move the contents to the cloud, it is above the perimeter. Even if you are pretty sure you
Certain cybersecurity practitioners insist to impose technical controls to secure the infrastructure/system. To some degrees yes, basic technical controls will
It is no harm to have dual standard to fit specific use case. As long as the directive is clearly
Recently I gave a talk to a local university students about cyber survivability. At the end of the session, it's
There are network anomaly detection technologies to alert abnormal network traffic of potential cyberattack. The pre-requisite is let the technology
Cybersecurity policy establishment and cybersecurity policy enforcement are usually executed independently in an organization. Normally, policy authors are more knowledgeable
Policy statement must be clearly defined and published. It must also be precise without ambiguity but subject to interpretation by
Availability is one of the protection objectives in cybersecurity. When deploying new systems, the design must cater for spare capacity.
It is easy to for artists to draw something or writers compose fictions beyond imagination. Such creation even stimulates innovation
When we deploy control, we always have to understand what we are trying to achieve. In the illustration, if the