Skip to main content

Posts

How functional and secure AES is

How functional and secure AES is? The Philippine electorate will once again go to polls and decide who will lead the nation in the next six years of their lives. This important event which will elect new president, vice president and 12 senators for national posts, and seats are also being contested for provincial, city and municipal levels, is expected to be counted unofficially in 24 hours, concluded or canvassed officially in a few days or so but authorities and observers expected it to be done in less than a week. Last presidential election, it was known three days after close of election precincts. This is especially true for nation states, not only the Philippines, that conducts their elections using automated election or computerized-and-networked voting systems. In PH, the past automated elections were encumbered with technical issues and fraudulent results, uttered and written everywhere by many concerned and affected individuals and institutions alike. This time, we could say
Recent posts

Basic idea of strategy in the 𝖎* of 𝖎𝖈𝖑𝖆𝖘𝖘𝖊𝖉, cyber and TICO as a whole

Organization can impress upon with different tasks and responsibilities being attended to regularly by its stakeholders thereby gaining the upper hand in its production relative to smaller ones or individuals with limited workforce, and in a relentless aim a strategy of smaller entities cannot even be subdued, as history would suggest, by the greater ones. Productions caused by technology may not be affected by the number in human resources running it for a very good reason. It is entirely dependent on technology capacity with a leaders’ know-how on the business objective. With strategy, which can be mustered differently in many situations and environment and where the size of the organization is necessarily not a repute is especially true in TICO, most evidently in the area of operational technology with its increasing reliance on data especially nowadays. This is apprehended by those who has organization’s or top decision-maker's responsibility, mostly with leadership position se

How do we see security and privacy in the enterprise

Enterprise system, infrastructure, data, services, distinct roles, operating functions and management controls have built in basic security and privacy capabilities. Whether or not it is a mandate, which is usually assured and backed by business conduct and applicable policies, security and privacy have to be utilized and configured correctly to suit the needs of the entire organization not just a particular scope or business unit. Security and privacy attack vectors and velocity have never been so dynamic and logistical opportunity is not a burden at all nowadays. There has to be an unwavering disposition on security and privacy initiative. Regardless of industry setting, security and privacy must remain a foothold mechanism by the technology at large. Security can be designed and deployed to prevent incidents and malicious intents toward technology and data. Technology and data are complementary on purpose and they can be tightened, not restricted, not only by making sure their built

[TW] IT documents, audit and leaders

IT documents comes with different names such as the following: - Manual or handbook, - Policies and procedures, - Management systems, - Project plans. In the real world we have various names with unique descriptions and purposes when in fact they could be made to do a uniform direction for which actions are based for the entire IT initiatives, probably the longest in IT lifecycle is operation. The problem is our inclination on something else which is wrong. IT remains an IT area. Business remains a business area. The same problem is carried out when we conduct IT audit. Most audit are missing the gists in which IT is being used by businesses. We once said that an effective IT audit is conducted by IT people themselves but there is something wrong with that even. Business and accounting people have been doing it with a different bias and preconceived notions which doesn't make the cut for IT direction and audit respectively. Leaders play the same game and so the problem continues an