Banner Shadow

Services

Gallery

About

Two lanes but 3 traffic signs. Is the middle lane hidden? Information concealment is one of the techniques to hide
In physical world, it is a geographical critical and strategic passage. Armed force is able to control what is allowed
GRC is the typical jargon when we talk about the cybersecurity posture in an organization. Risks, no matter in terms
The commodities (toys) are encapsulated in the vending machine (plastic containers). All containers share the same Point of Sales (PoS)
We face many "policies" (directives) everyday - whether in real world or in the cyber space. And we are told
DMZ becomes the de facto standard for network segmentation. It is used to control network traffic across trust and untrusted
Sometimes, security protection needs reinforcement to avoid deterioration of effectiveness over time. This can easily be visualized in real world.
Enforcement Having policy as written document isn't enough. If there is violation, it must be enforced thru correctional approach. In
When we develop written directive, there might be chance that certain elements are assumed and be implicit. It is essential
I have seen cybersecurity directive regarding applicability is to protect OT (Operational Technology) system so as to minimize cyber attacks
Some cybersecurity practitioners only drill down to the level of details of network diagram or even wiring diagram to identify
In policy development, it is essential the coverage of the rule is sufficient and precise to avoid ambiguity. A living