Andy (אברהם נפתלי) Blumenthal Leadership, Technology, Life, and Faith ✡
Pages
(Move to ...)
Home
Articles
Books
Facebook
LinkedIn
Links
Muck Rack
Qoshe
Slideshare
SoundCloud
Times of Israel
Twitter
YouTube
▼
Showing posts with label
IT security
.
Show all posts
Showing posts with label
IT security
.
Show all posts
October 23, 2017
Cybersecurity Vulnerabilities Database
›
There is a very useful article in Bloomberg about how the U.S. is taking too long to publish cybersecurity vulnerabilities. And the lo...
October 19, 2017
Never Ever More Vulnerable
›
So we have never been more technology advanced. And at the same time, we have never been more vulnerable . As we all know, our cyberse...
April 12, 2016
Turn, Press, Pull -- Gonna Get Ya
›
So as I go around town, I see more and more of these industrial-type control panels. The problem is that they are stupidly in the op...
June 10, 2014
I Like That Technology
›
Christopher Mims in the Wall Street Journal makes the case for letting employees go rogue with IT purchases. It's cheaper, it...
May 6, 2013
Learning IT Security By Consequences
›
This is a brilliant little video on IT Security. What I like about it is that it doesn't just tell you what not to do to stay safe,...
October 12, 2012
Cloud $ Confusion
›
It seems like never before has a technology platform brought so much confusion as the Cloud. No, I am not talking about the definitio...
June 5, 2012
SDLC On Target
›
I found this great white paper by PM Solutions (2003) called " Selecting a Software Development Life Cycle (SDLC) Methodology ....
November 27, 2011
Running IT as an Ecosystem
›
The New York Times (27 November 2011) has an interesting article under "bright ideas" called Turn on the Server. It's Co...
November 3, 2011
Cloud, Not A Slam Dunk
›
Interesting article in Nextgov about the deep skepticism of cloud computing by the Corporate IT Pros. ...
October 20, 2011
Be Careful What You Point That At
›
By now many of you may or may not have pointed your smartphones at a QR ("Quick Response") code to get more information on...
October 14, 2011
EMP Cybergeddon
›
Electromagnetic Pulses (EMPs) are the weapons of choice against electronics of all sorts, including cyber. The Economist (15 October 20...
October 13, 2011
Increase Security On Your Google Account
›
After reading the article Hacked! in The Atlantic (November 2011), I looked into Google's new security feature called 2-Step Verificat...
September 9, 2011
Visualizing IT Security
›
I thought this infographic on the " 8 Levels of IT Security" was worth sharing. While I don't see each of these as completel...
August 20, 2011
Cloud Second, Security First
›
Leadership is not about moving forward despite any and all costs, but about addressing issues head on . Cloud computing holds trem...
July 30, 2011
Sensors, Sensors Everywhere
›
Sensors will soon be everywhere --waiting, watching, and working to capture information about you and the environment we inhabit. Every s...
July 23, 2011
Getting To Swift Cyber Justice
›
The first Department of Defense Strategy for Operating in Cyberspace is out (July 2011). Of course, like the plans that came before (e.g...
June 19, 2011
Crashing The Internet--Are We Prepared?
›
Almost week after week, I read and hear about the dangers of cyber attacks and whether "the big one" is coming. The big one...
January 22, 2011
When My Friend Got Hacked
›
True story. So an old friend of mine had his account hacked on Facebook. And the hacker is sending chat messages to my friend’s Fac...
›
Home
View web version