Skip to content
The SECOND Advisories Limited
Your Trusted Cybersecurity Advisor
Home
Blog
What;s New
Contact
Resources
Cybersecurity is neither product nor solution.
It is a never-ending journey with ongoing challenges to reach the rolling target of stakeholders expectation.
Automation is everywhere, be seen or behind the scene.
Cybersecurity becomes everyone's concern and therefore everyone's responsibility.
Critical Infrastructure Failure Has High Impact.
They must be secured to maintain reliable services.
Systems are no longer deployed as islands.
They are connected and accessible anywhere, anytime, any network, any device and any platform.
And so are people getting connected.
... mostly in the cyber world, even when face-to-face.
Cloud, Social Network, IM, AI are dominating.
Demarcation of biz and non-biz use, trusted and untrusted app are diminishing.
We are living in real and cyber space.
... always exposing to threats and must follow the same risk-taking principles for cost-effective and optimal protection.
Hackers are all around.
Be vigilant and smart to avoid being victim.
Collect latest cyber threat intelligence.
But assess material impacts to specific business environment by competent cybersecurity practitioners to avoid FUD.
Prepare for the worst.
React promptly to resume services to maintain survivability.
Streamlined IR is the bottom line.
Because we don't know what threats we don't know.
Engage all levels.
Ask what you can do for cybersecurity.
Be part of the transformation.
Each of us plays a different roles to protect the cyber community.
Cybersecurity is needed for all entity size.
... as mutual protection for individual and connected neighbor.
Act now and don't wait.
Are you ready for this journey and explore with us?
Services
Provide vendor neutral cybersecurity advisories to enhance the organization cybersecurity posture Act as a trusted...
Gallery
Slipping away for a break from cybersecurity conference / event (alphabetic order). Non-Cyber – Travel
About
Founded in 2016 ... Subject Matter Expert of cybersecurity in ICT (Information and Communications Technology) and ICS (...
We are all just prisoners here, of our own device ...
Disruptive technologies and their rapid advancement have changed the way we live. With proliferation of Internet hotspot (mostly free) &
Excessive and Unnecessary Control
Adding control won't give you more security. I came across advices from other cybersecurity practitioner that overkills. Indeed, the insecure
ROAM
Remote Office Access Method (inspired by ISAM, VSAM in old days) has undergone significant changes over the past decades due
WiFi
Getting connected to the Internet for various activities (getting updates from email, news, social media, weather, checking maps, traffic condition
Risk Evaluation
Risk assessment is the approach to identify hazard and implement proper controls to reduce likelihood. When doing so, we should
Do The Right Thing
No matter in physical or cyber world, there are facilities built for people using them to achieve certain purposes -
Proper Usage #2
Every system has its own weakness and limitation. We can't build a total secure system practically unless it is on
Vulnerability Management #2
Vulnerability Management or Scare Your Management Some cybersecurity practitioners conduct vulnerability management (VM) by just using automated vulnerability scanning tool
Information Integrity #2
Disseminating of informative message appears does not have much of cybersecurity concerns. However, it depends on the usage purpose. If
Insider #2
Industrial Control Systems (ICS) in a plant are now modernized using commodity hardware and software with networking capability to enhance
Onion Approach
Information protection is usually via layered defence, sometimes refers as the "onion approach". In physical world, protected contents are placed
Rule or Ruler
As a security practitioner, providing advice in securing the organization cyber assets is the expected responsibilities and everyone in the
« Previous
1
…
7
8
9
10
11
…
24
Next »