Skip to content
The SECOND Advisories Limited
Your Trusted Cybersecurity Advisor
Home
Blog
What;s New
Contact
Resources
Cybersecurity is neither product nor solution.
It is a never-ending journey with ongoing challenges to reach the rolling target of stakeholders expectation.
Automation is everywhere, be seen or behind the scene.
Cybersecurity becomes everyone's concern and therefore everyone's responsibility.
Critical Infrastructure Failure Has High Impact.
They must be secured to maintain reliable services.
Systems are no longer deployed as islands.
They are connected and accessible anywhere, anytime, any platform.
And so are people getting connected.
... mostly in the cyber world, even when face-to-face.
Cloud, Social Network, IM, AI are dominating.
Demarcation of biz and non-biz use, trusted and untrusted app are diminishing.
We are living in real and cyber space.
... always exposing to threats and must follow the same risk-taking principles for cost-effective and optimal protection.
Hackers are all around.
Be vigilant and smart to avoid being victim.
Collect latest cyber threat intelligence.
But assess real impacts to specific business environment by competent cybersecurity practitioners to avoid FUD.
Prepare for the worst.
React promptly to resume services to maintain survivability.
Streamlined IR is the bottom line.
As we don't know what threats we don't know
Engage all levels.
Ask what you can do for cybersecurity.
Be part of the transformation.
Each of us plays a different roles to protect the cyber community.
Cybersecurity needs ... entity size doesn't matter.
... as mutual protection for individual and connected neighbor.
Act now and don't wait.
... as mutual protection for individual and connected neighbor.
Services
Provide vendor neutral cybersecurity advisories to enhance the organization cybersecurity posture Act as a trusted...
Gallery
Slipping away for a break from cybersecurity conference / event (alphabetic order). Non-Cyber – Travel
About
Founded in 2016 ... Subject Matter Expert of cybersecurity in ICT (Information and Communications Technology) and ICS (...
Container or Content
When installing controls, you have to understand what is the protection objective. Don't just apply textbook knowledge for the sake
Dual Home
Certain cybersecurity practitioners have no knowledge of the implication when writing policy statement even with help from external subject matter
FUD #2
Things outside your comfort zone or knowledge will generate FUD. There are always news exaggreating cyber risks causing severe consequence
Patches
One of the key activities in cybersecurity is to deploy security patches on regular basis. This is intended to upkeep
Consequence
Certain cybersecurity practitioners are obsessive on technical controls. They overlook the consequence due to cyber or other non-cyber causes will
Information Security
It is the early term in this domain. It covers everything under the sun regarding information.As time goes by, information
Policy #10
In an organization, policy affects the culture and work practices. A good policy is practically achievable, acceptable and having buy-in
Infected
A leaft in a plant is infected. Saving the plant should contain and neutralize the infected from spreading to other
Architecture
ICS now totally utilitizes general computing equipment (server, workstatiom, OS, DB, communication) rather than developing own C&I. Therefore, OEM has
Improper Control #2
Technical control is just one of the security measures. There are much surrounding elements to take care in order to
Policy Making
For certain job roles of cybersecurity practitioners, policy making is necessary as a foundation in running the business securely to
Stepping Stone #2
Jump hosts are typical used for remote access. These are controls: User accounts with multi-factor authenticationTime of day granted to
« Previous
1
2
3
4
…
20
Next »