Andy (אברהם נפתלי) Blumenthal Leadership, Technology, Life, and Faith ✡
Pages
(Move to ...)
Home
Articles
Books
Facebook
LinkedIn
Links
Muck Rack
Qoshe
Slideshare
SoundCloud
Times of Israel
Twitter
YouTube
▼
Showing posts with label
Cybersecurity
.
Show all posts
Showing posts with label
Cybersecurity
.
Show all posts
April 4, 2025
Robot in DC
›
(Credit Photo: Minna Blumenthal)
December 15, 2024
Counting the Minutes: Turning To G-d
›
Please see my new article in The Times of Israel called " Counting the Minutes: Turning To G-d ." The clock is ticking, but are w...
February 20, 2022
Lessons From Israel In Stopping Ransomware
›
Please see my new article in The Times of Israel called " Lessons From Israel In Stopping Ransomware ." Israel is a small, but pow...
January 1, 2022
A 2022 New Year of Eggs
›
New Years 2022. Congratulations! But I wouldn't call it "eggcellent," because there is a lot of world instability and fear lo...
March 22, 2020
We Just Magically Found $2,000,000,000,000
›
It's amazing how we can magically find $2 trillion for a Coronavirus "Rescue Plan." This after we already wasted over $6...
May 9, 2019
@National Cybersecurity Center of Excellence
›
So good today to visit the NIST Cybersecurity Center of Excellence (NCCoE) . The cybersecurity solutions developed are aligned to ...
April 27, 2019
Top Secret Tinseltown
›
So this is a city with a lot of secrets. I'm not talking about just the run-of-the-mill, non-disclosure agreement (NDA). This i...
September 11, 2018
17 Years Since 9/11
›
Today is the 17th anniversary since that fateful day of 9/11 when the terrorists brought down both World Trade Centers and ploughed anothe...
August 15, 2018
Floppy Disk Earrings
›
So this was an interesting technology fashion statement. This lady in Washington, D.C. has earrings that are floppy disks. One full d...
July 25, 2018
In the Know Or Dark
›
So here is one way that some people can (try to) manipulate you--positively or negatively. They can help either to keep you "in th...
May 7, 2018
Weaponizing Your Privacy
›
So this was the funniest War of the Roses on the Kane Show that I ever heard. They use the Alexa personal assistant from Amazon (voiceove...
May 2, 2018
Computer Sentiment 1984
›
So I found this book in an IT colleague's office. It's called: "The Unofficial I Hate Computer Book". It was writ...
February 21, 2018
From Malware To Malevolent People
›
So in virus protection on the computer, there are 2 common ways antivirus software works: 1) Signature Detection - There are known pa...
February 13, 2018
Cyber Attacks Typology
›
Saw this acronym to describe the types of cyber threats and thought it was useful. STRIDE S poofing - Falsifying identity to gain syst...
November 27, 2017
Technology Forecast 2018
›
Here are Andy Blumenthal's technology forecast and priorities for 2018. 1. Medical Computing - Continue the significant progress an...
1 comment:
October 23, 2017
Cybersecurity Vulnerabilities Database
›
There is a very useful article in Bloomberg about how the U.S. is taking too long to publish cybersecurity vulnerabilities. And the lo...
October 19, 2017
Never Ever More Vulnerable
›
So we have never been more technology advanced. And at the same time, we have never been more vulnerable . As we all know, our cyberse...
October 14, 2017
We Broke The Weather
›
So my friend who lives in FL and recently experienced the crazy hurricanes down there said something very interesting to me. This was d...
October 12, 2017
Reconquest of the Soviet Union
›
Okay, when I saw this map of the Soviet Union pre-1991 breakup, I got it! Russia lost 14 Former Soviet Union (FSU) states after the fal...
October 6, 2017
People, Process, and Technology Lifecycles
›
The table describes the alignment of the various people, process, and technology lifecycles commonly used in Information Technology to the...
›
Home
View web version