Skip to main content

Posts

Showing posts from April, 2022

HTTP Strict Transport Security strict browser processing or bug prevention or what?

Having a different internet browser makes handy for people whose job is to make sure any web service or application, and their behavior, would not fail before and after making any changes, or upgrade. In our definition, it is that it would not fail regardless of methods, not the geeky ones and without harm of course, applied to access, in a regular way, a resource designed and made available to the public. We think that premise, which is to "make sure it will work, somehow a little better", characteristic of our work @𝖎𝖈𝖑𝖆𝖘𝖘𝖊𝖉, is true to any technology designed for use mainstream but which this post is toned or using such example, specifically. Do you know what causes a browser to process a web service or application like this in the image? We would see it is due to an HSTS, primarily, not being processed or some bug prevented to load by, in here we have, Microsoft Edge Dev browser where a notice is produced. Then it could be that, with other browsers, this is not at

Basic idea of strategy in the 𝖎* of 𝖎𝖈𝖑𝖆𝖘𝖘𝖊𝖉, cyber and TICO as a whole

Organization can impress upon with different tasks and responsibilities being attended to regularly by its stakeholders thereby gaining the upper hand in its production relative to smaller ones or individuals with limited workforce, and in a relentless aim a strategy of smaller entities cannot even be subdued, as history would suggest, by the greater ones. Productions caused by technology may not be affected by the number in human resources running it for a very good reason. It is entirely dependent on technology capacity with a leaders’ know-how on the business objective. With strategy, which can be mustered differently in many situations and environment and where the size of the organization is necessarily not a repute is especially true in TICO, most evidently in the area of operational technology with its increasing reliance on data especially nowadays. This is apprehended by those who has organization’s or top decision-maker's responsibility, mostly with leadership position se

How do we see security and privacy in the enterprise

Enterprise system, infrastructure, data, services, distinct roles, operating functions and management controls have built in basic security and privacy capabilities. Whether or not it is a mandate, which is usually assured and backed by business conduct and applicable policies, security and privacy have to be utilized and configured correctly to suit the needs of the entire organization not just a particular scope or business unit. Security and privacy attack vectors and velocity have never been so dynamic and logistical opportunity is not a burden at all nowadays. There has to be an unwavering disposition on security and privacy initiative. Regardless of industry setting, security and privacy must remain a foothold mechanism by the technology at large. Security can be designed and deployed to prevent incidents and malicious intents toward technology and data. Technology and data are complementary on purpose and they can be tightened, not restricted, not only by making sure their built