National Cyber Security Policy (NCSP) is a by-product of the national level to carry out the National Cyber Security Strategy that is based on strategy intent to be in, from current where they are, and level up from where the national are. In execution, we keep saw lot of countries attempt to “smart copy” from
In our time, industrial and critical infrastructures are adopting Internet of Thing (IoT) at an unprecedented rate. While digital transformation in operational technology (OT) can optimise production, drive innovation and increase efficiency, it is not without the risk of increasing cyber threat. Without a proper OT cyber security, our OT device is highly exposed to
What is the risk of Internet of Behaviour (IoB)? An article released by Gartner, in October 2020, stated that “IoB does have ethical and societal implications depending on the goals and outcomes of individual uses”. Therefore, while the IoB has been recognised its contribution especially in business and healthcare, its risk should not be disregarded.
The cyber attack kill chain is a series of steps that trace stages of a cyberattack from the early reconnaissance stages to the exfiltration of data. The kill chain helps us understand and combat ransomware, security breaches, red-teaming attack lifecycle and advanced persistent attacks (APTs). In brief, Cyber attack kill chain involves several core stages,
What is Computer Network Defense? Computer Network Defense (CND) is a set of procedure and securing measures that use computer networks to detect, monitor, protect, analyze and defend against network infiltration resulting in service or network denial, degradation and disruptions. CND will acknowledge against an unauthorized activity, for instance within the Department of Defense (DoD)
World had moving toward digitalization and replace traditional industry and sector, digital economy become mainstream worldwide. From corporate and e-government digital transformation (DT), it become one of the mission critical infrastructure (MCI) regardless of country size, all will invest heavily to make sure at the national level maintain competitiveness in this national core competency. To
Zero trust architecture is focused on what the business needs and to be functionally in organization systems by implementing network-centric date security that provides access to the only person who needs it. In a legacy network, organizations have little to no visibility or control regarding network and data usage, but with a Zero Trust Architecture,
The organization that need to reliably prevent the exfiltration of sensitive data and want to improve their system to defend again modern cyber threats can consider a Zero Trust architecture. This Zero Trust is introduced by analyst firm Forrester Research that alternative architecture for IT security. So Zero Trust, Zero Trust Network or Zero Trust
The organization today operates differently a few years ago. Organizations are increasingly turning away from solutions that secure the perimeter and then trust everything inside and are instead moving to a zero trust security model to protect sensitive resources and data. Under the assumption that a Zero Trust solution dynamically and continually assesses trust every
E-SPIN please to announce for the following latest round of the Immunity CANVAS and SILICA, CANVAS Exploitation Pack update and upgrade for the following related product lines compiled from the various technical resources for easy reading in one go: D2 Elliot Web Exploitation Framework 1.14, August 7 2018 D2 Elliot has been updated with 11
Before we can start talking about the concept of cyber business intelligence, we need to understand where IT factors in when BI is in question. Well, it is an integral part of it. In most companies, it is the IT department that is first tasked with collecting data and analyzing it. This is perfectly natural.