Banner Shadow

Services

Gallery

About

Risk assessment is the approach to identify hazard and implement proper controls to reduce likelihood. When doing so, we should
No matter in physical or cyber world, there are facilities built for people using them to achieve certain purposes -
Every system has its own weakness and limitation. We can't build a total secure system practically unless it is on
Vulnerability Management or Scare Your Management Some cybersecurity practitioners conduct vulnerability management (VM) by just using automated vulnerability scanning tool
Disseminating of informative message appears does not have much of cybersecurity concerns. However, it depends on the usage purpose. If
Industrial Control Systems (ICS) in a plant are now modernized using commodity hardware and software with networking capability to enhance
Information protection is usually via layered defence, sometimes refers as the "onion approach". In physical world, protected contents are placed
As a security practitioner, providing advice in securing the organization cyber assets is the expected responsibilities and everyone in the
Due to rapid technology advancement, business operations are always undergone transformation. A phone kiosk becomes legacy as the use case
No doubt, the technology is secure. But without assessing the situation holistically, this is inconclusive. Rulesets might be wrongly set
When writing policies, positive logic shall be adopted. It eases readers understand what is allowed rather than spending time to
We have a lot of personal data exposed in the cyber world in our daily life. To name a few,