Sign in

Zen Chan

Cybersecurity | Technology

Why It is More Like a Mindset Than An Architecture

Image by mohamed_hassan from

The concept of "Zero Trust" has been around for years. Unfortunately, this concept becomes a cybersecurity catchphrase with cyberattacks like spear-phishing, ransomware, and business email compromise (BEC) at all-time highs. Even the notoriously slow government cybersecurity planning is going all-in on this matter.

However, a crucial obstacle to widely adopting…

Cybersecurity | Technology

Why “Free” Is The Most Expensive Price and What is “Zero-Knowledge Proof”

How To Be Anonymous Online — Part II | by Zen Chan | Medium
Image by Johnny Silvercloud from Flickr | CC2.0

“Real integrity is doing the right thing, knowing that nobody’s going to know whether you did it or not.”
― Oprah Winfrey

After I published Part I of “How To Be Anonymous Online,” apart from people saying, “I have nothing to hide!” people strive to protect their data. …

Cybersecurity | Technology

It’s Time To Protect Yourself; Even You Have Nothing To Hide

How To Be Anonymous Online. It’s Time To Take Back Our Control on… | by Zen Chan | Medium
Image by Tony Webster from Wikimedia | Creative Commons

“All human beings have three lives: public, private, and secret.” ― Gabriel García Márquez

A while back, I met an old friend who I hadn’t seen since I graduated. We went for a cup of coffee to catch up for the past decades. He told me he was watching “Breaking…

From top stories to practical guides

List of Zen’s InforSec on Medium and Thank you. | by ZEN CHAN | Dec, 2020 | Medium
“Miracles do happen” in Central, Hong Kong | Copyright by the author

I wrote on Medium in November 2019. I still remember the first story was written at the Suvarnabhumi Airport (BKK) in Thailand. I typed on my Pixel 2XL, using the on-screen keyboard when I was waiting for my girlfriend's arrival.

Not many people use Medium in Hong Kong, but I…

What I learned after becoming an ISSAP®

The ONE thing that makes a Great Cybersecurity Professional What I learned after becoming an ISSAP®
Photo by Hunters Race on Unsplash

I Passed!

I just passed the exam of ISSAP® — Information Systems Security Architecture Professional from (ISC)2®. It was one of the most challenging exams I took in my life. All the answers to the multiple choices are correct, but it is required to choose the best answer in most cases. I…

Privacy | Technology

Researchers Find Android Tracks Users And Share Data to OS's Developers

Photo by Denny Müller on Unsplash

“And remember… don’t be evil, and if you see something that you think isn’t right — speak up!”

— Google Code of Conduct before April, 2018

When I heard that Google removed the famous "Don't be evil" from their code of conduct, I was disappointed. But, even worse, researchers recently…

Technology | Privacy

And How to Prevent Apple From Reading Your Messages

Photo by Ben Kolde on Unsplash

If you are an iPhone user, and your friends, too, you probably use the Apple iMessage app for day-to-day communication. Apart from the app is intuitive and convenient, it also provides end-to-end encryption to safeguard your conversations. The encryption, by default, can protect your messages from Apple’s eyes, too.


Technology | Cybersecurity

One of the Best and Easy-to-read Guidance for Securely Using VPN Solutions

Image by Mike MacKenzie from Flickr (CC BY 2.0)

“Remote access VPNs are entryways into corporate networks and all the sensitive data and services they have. This direct access makes them prized targets for malicious actors. Keep malicious actors out by selecting a secure, standards-based VPN and hardening its attack surface. This is essential for ensuring a network’s cybersecurity.”

Technology | Cybersecurity

Cloud Security Posture Management, Zero Trust, Shared Responsibility Model, and More

Image by the author

“With Cloud Computing, it is no longer a question of If, but rather When and How.”

Ludmila Morozova-Bussva

President Biden's Executive Order 14028 "Improving the Nation's Cybersecurity" directed the Cybersecurity and Infrastructure Security Agency (CISA) to create a cloud-security technical reference architecture (CSTRA) in cooperation with the Office of…

Technology | Cybersecurity

Introduction of the Top Three Zero Trust Architectures (ZTA)

ZTX, CARTA, SP800–207 | Image by the author

Vendors hear new buzzwords — Zero Trust Architecture or ZTA, and then they try to package a product they already have into that: "Now with 20 percent more Zero Trust!" — that is the biggest problem. …

Zen Chan

Interested in Infosec & Biohacking. Security Architect by profession. Love reading and running. Top Writer in Privacy. Editor of Technology Hits.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store