Skip to content
The SECOND Advisories Limited
Your Trusted Cybersecurity Advisor
Home
Blog
What;s New
Contact
Resources
Cybersecurity is neither product nor solution.
It is a never-ending journey with ongoing challenges to reach the rolling target of stakeholders expectation.
Automation is everywhere, be seen or behind the scene.
Cybersecurity becomes everyone's concern and therefore everyone's responsibility.
Critical Infrastructure Failure Has High Impact.
They must be secured to maintain reliable services.
Systems are no longer deployed as islands.
They are connected and accessible anywhere, anytime, any platform.
And so are people getting connected.
... mostly in the cyber world, even when face-to-face.
Cloud, Social Network, IM, AI are dominating.
Demarcation of biz and non-biz use, trusted and untrusted app are diminishing.
We are living in real and cyber space.
... always exposing to threats and must follow the same risk-taking principles for cost-effective and optimal protection.
Hackers are all around.
Be vigilant and smart to avoid being victim.
Collect latest cyber threat intelligence.
But assess real impacts to specific business environment by competent cybersecurity practitioners to avoid FUD.
Prepare for the worst.
React promptly to resume services to maintain survivability.
Streamlined IR is the bottom line.
As we don't know what threats we don't know
Engage all levels.
Ask what you can do for cybersecurity.
Be part of the transformation.
Each of us plays a different roles to protect the cyber community.
Cybersecurity needs ... entity size doesn't matter.
... as mutual protection for individual and connected neighbor.
Act now and don't wait.
... as mutual protection for individual and connected neighbor.
Services
Provide vendor neutral cybersecurity advisories to enhance the organization cybersecurity posture Act as a trusted...
Gallery
Slipping away for a break from cybersecurity conference / event (alphabetic order). Non-Cyber – Travel
About
Founded in 2016 ... Subject Matter Expert of cybersecurity in ICT (Information and Communications Technology) and ICS (...
Supporting System
Mostly, people put focus cybersecurity on critical infrastructure. We must not forget the cybersecurity for supporting systems are equally important
Penetration
Cybersecurity is becoming commodity skill and therefore same terminology will have different interpretation by different parties. Pick penetration test (pTest)
Threat Hunting
Suddenly, new market jargon "threat hunting" is spreading around under cybersecurity domain. It is a kind of proactive measure to
Spam
Everything in the world is relative. For some, spam mails are annoying and try to filter them off the mailbox
Stepping Stone
Systems and components are connected in the cyber space. Some have misconception that my setup are for development, or its
ROI
Return On Investment (ROI) is the typical approach to justify the spending to acquire asset. For the sample solar renewable
Network
Network exists in both physical and cyber worlds. Both have physical portion and content portion. Even in cyber perspective, both
Born or Made
Cybersecurity vulnerabilities are broadly categorized into 2 types: [a] Inherent weakness in the component, protocol (e.g. PLC, ftp) that is
Direction
Establishing cyber directives (policies) is challenging. On one hand, the language must be chosen not too specific for flexibility but
End of Road
In physical journey, there is always an end such as End of vacation, back to workRoad blocked by obstacle, detour
Big or Small
Cyber assets, no matter big or small, must be managed via the same practice and same maintenance regarding cybersecurity as
Dormant
Malware nowadays is getting sophisticated - has small footprint, evade sandbox & detection, determine platform to inject the applicable payload,
« Previous
1
…
9
10
11
12
13
…
20
Next »