Andy (אברהם נפתלי) Blumenthal Leadership, Technology, Life, and Faith ✡
Pages
(Move to ...)
Home
Articles
Books
Facebook
LinkedIn
Links
Muck Rack
Qoshe
Slideshare
SoundCloud
Times of Israel
Twitter
YouTube
▼
Showing posts with label
Cyber Security
.
Show all posts
Showing posts with label
Cyber Security
.
Show all posts
November 15, 2016
Why Can't We Keep Our Secrets
›
Well after the now notorious email scandal and other information security mishaps galore, this advertisement in Washington, DC is really q...
October 12, 2016
Losing Patience With Tech Progress
›
We're so close yet so far...that's my feeling as I grow ever impatient with the pace of technological progress. We have cloud...
August 25, 2016
Modesty And Privacy Of Body and Information
›
So modesty and privacy is very important in terms of propriety and security. Both are intimately connected. Already as children, we l...
December 22, 2014
Peace To All Mankind
›
I liked this post in downtown Washington, D.C. inscribed with the following: "May Peace Prevail On Earth." It left me wonder...
November 22, 2014
Dire Warnings On CyberSecurity
›
This week Adm. Michael Rogers, the Director of the National Security Agency and head of U.S. Cyber Command issued a stark warning to the...
October 3, 2014
Data Like Clouds
›
So data is like clouds... Clouds want to be free roaming the wild blue skies similar to how data wants to be searchable, accessible, u...
February 27, 2014
Newspaper, Identity Thief
›
So, true story. I know identify theft is a serious matter, but really... I'm heading out of the driveway and I see the newpaper de...
February 22, 2014
National State Of Cyber Insecurity
›
This video is a wake up call on the state of our national cyber insecurity. It is the opening statement (about 6 minutes) of Chairman M...
February 21, 2014
Can You Trust Social Media?
›
Interesting article in BBC about a project underway to develop a system that will rate information on the Internet as trustworthy or not....
January 25, 2014
Remodulate The Shields For Cyber Security
›
I really like the concept for Cyber Security by Shape Security . They have an appliance called a ShapeShifter that uses polymorphism to c...
January 21, 2014
Care To Be Curious?
›
Here's three topics for the curious of mind today: - Are we technologically safer? As we attempt to beef up IT security, we contin...
July 30, 2013
When GPS Takes You Down The Wrong Path
›
Mashable is reporting that a team of university students from University of Texas at Austin were able to spoof the GPS receivers on an $8...
July 29, 2013
Medical Hacks
›
Usually when we talk about the dangers of cyber attacks, we are concerned with the dangers of someone stealing, spying, or systematic...
July 21, 2013
Like Buying A Nuke On The Black Market
›
Buying a serious computer vulnerability is now like acquiring a nuke on the black market. Nations and terrorists will pay to find the...
July 10, 2013
Emergency Alert Or R U Kidding?
›
BBC News Technology (9 July 2013) reports on how the U.S. Emergency Alert System (EAS) was hacked. The EAS is a program of the Fed...
March 31, 2013
Searching For Cybersecurity Warriors
›
For those interested in the field of cybersecurity, I wanted to share some useful websites that I've come across: 1) Cybersecurity ...
March 23, 2013
Innovation Infertility
›
Many of you may have probably the seen the movie, "Children of Men,"--it is themed around a time in the future when women are in...
February 27, 2013
Cyberweapons Power Up
›
In you haven't heard of Project Aurora, this is a wonderful segment from 60 Minutes on this cyberwar project. Faced with some o...
February 23, 2013
Analyzing The Law
›
So I am back in school AGAIN (I'm a life-long learner), augmenting my not so slow-paced job. Let's just say that at this poi...
February 2, 2013
This Tape Will Self Destruct In Five Seconds
›
Ever since the 1960's airing of Mission Impossible, where each episode started with the instructions for a dangerous mission on a ta...
›
Home
View web version