Banner Shadow

Services

Gallery

About

Industrial Control Systems (ICS) in a plant are now modernized using commodity hardware and software with networking capability to enhance
Information protection is usually via layered defence, sometimes refers as the "onion approach". In physical world, protected contents are placed
As a security practitioner, providing advice in securing the organization cyber assets is the expected responsibilities and everyone in the
Due to rapid technology advancement, business operations are always undergone transformation. A phone kiosk becomes legacy as the use case
No doubt, the technology is secure. But without assessing the situation holistically, this is inconclusive. Rulesets might be wrongly set
When writing policies, positive logic shall be adopted. It eases readers understand what is allowed rather than spending time to
We have a lot of personal data exposed in the cyber world in our daily life. To name a few,
Confidential information is costly to maintain. Imagine all the 3 data states (data-in-motion, data-at-rest, data-in-use) will require technology and the
This is widely adopted in various process like: Asset discovery: to scan the network and take inventory of the components
Worry about breaching GDPR or PCIDSS? The most effective means is to avoid capturing these info that need protection. Accepting
At certain situations, enforcement of policy relies on administrative control when technical controls are not feasible. But how do we
Durnig pandemic situation, InfraRed body temperature detection technology is great - contactless, accurate, multi-persons processing, seamlessly and transparent to customers.