Security Insight

Feasibility Study (F/S) for Tanzania Cybersecurity Training / Certification Center Project was successfully completed.

   The Tanzania ICT Commission recognizes the importance of cybersecurity at the national level, and as part of this, we are pursuing a national cybersecurity policy with great interest in fostering professional experience.    The Korean government agency KISA (Korea Internet & Security Agency) and the Tanzania Government ICT Commission signed a project agreement for […]

The 2018 Kosovo / TAK’s Adaptive Security System Development Pilot Project has been successfully completed

“The 2018 Kosovo/TAK’s Adaptive Security System Development Pilot Project” which carried out for seven months through May to November for the Tax Administration of Kosovo has been successfully completed.The Tax Administration of Kosovo which is an agency of the Ministry of Finance of Kosovo is responsible for all tax related affair, and the purpose of

APT VULNERABILITY CHECK CONSULTING CASE

CLIENT A company (oil refinery) BACKGROUND AND TOPIC As a global company, it operates a large number of information systems and is obliged to comply with legal regulations in the Information and Communication Network Act, it regularly explores vulnerabilities and hacks to professional firms every year. As the social issue of APT attack became big in

NATIONAL CYBER SECURITY STRATEGY PLANNING CONSULTING

CLIENT The Ministry of Information and Communication of Moldova NATIONAL ICT STATUS The Republic of Moldova, which is a developing country in Eastern Europe, is centered on the Ministry of Information and Communication (MITC), the Ministry of Information Technology and Communication (MITC), which establishes a national e-government plan called e-Moldova and invests about 8% Digital

A REFINERY PROCESS CONTROL SYSTEM CONSULTING CASE

CLIENT A refinery (refinery) PROJECT BACKGROUND AND TOPIC As a representative company in the petroleum industry, the customer is a representative company of the oil industry. In order to secure the security of the process control system of the large refinery owned by the province, based on the objective related standards at the international level,

USEFUL TOOLS FOR APPLICATION SOURCE CODE REVIEW

Most of the application source vulnerability diagnoses will receive a large number of source files and perform vulnerability diagnostics. Most of them are static diagnosis using a tool for diagnosing source vulnerabilities such as Fortify and dynamic manual diagnosis of a professional consultant. In this situation, it is common to utilize some useful tools because