Andy (אברהם נפתלי) Blumenthal Leadership, Technology, Life, and Faith ✡
Pages
(Move to ...)
Home
Articles
Books
Facebook
LinkedIn
Links
Muck Rack
Qoshe
Slideshare
SoundCloud
Times of Israel
Twitter
YouTube
▼
Showing posts with label
Vulnerabilities
.
Show all posts
Showing posts with label
Vulnerabilities
.
Show all posts
April 27, 2019
Top Secret Tinseltown
›
So this is a city with a lot of secrets. I'm not talking about just the run-of-the-mill, non-disclosure agreement (NDA). This i...
October 19, 2017
Never Ever More Vulnerable
›
So we have never been more technology advanced. And at the same time, we have never been more vulnerable . As we all know, our cyberse...
August 25, 2017
Ever Feel Like You're Target Practice
›
Thought this was really spot on. The knives get sharpened and readied. At some point, they come flying out of nowhere. Often, from...
June 23, 2017
Uber Overconfidence
›
As everyone knows, Uber is essentially--for now--a high-tech taxi company. And high-tech tends to command high price. But they are IMH...
April 19, 2017
Nation In Denial
›
We are a nation in utter denial over our problems. Just to name a few... Whether from the threat of North Korean dictator, Kim Jong Un...
October 11, 2016
On the Lookout To Managing Risk
›
So risk management is one of the most important skills for leadership. Risk is a function of threats, vulnerabilities, probabilities, a...
February 9, 2016
Cybersecurity Lost In Unknowns
›
Today unveiled is a new Cybersecurity National Action Plan . This in the wake of another Federal data breach on Sunday at the Departmen...
March 2, 2015
Metro Wide Open
›
I took this photo in the Washington, D.C. Metro today. What do you think it is? Lots of electronics, wires, lights--and in front of i...
March 9, 2014
SCADA in Pictures
›
So SCADA are Supervisory Control and Data Acquisition systems. They are a form of Industrial Control Systems (ICS) that m...
July 29, 2013
Medical Hacks
›
Usually when we talk about the dangers of cyber attacks, we are concerned with the dangers of someone stealing, spying, or systematic...
July 21, 2013
Like Buying A Nuke On The Black Market
›
Buying a serious computer vulnerability is now like acquiring a nuke on the black market. Nations and terrorists will pay to find the...
June 16, 2012
Securing Transport To The Cloud
›
A new article by Andy Blumenthal on cyber security and cloud computing in Public CIO Magazine (June 2012) called Securing Cloud Data M...
June 3, 2012
Raising The Bar On Cybersecurity
›
Good video by the The Washington Post (2 June 2012) on the importance and challenges of cybersecurity. There are 12 billion devices o...
May 5, 2012
Understanding Risk Management
›
Information Security, like all security, needs to be managed on a risk management basis . This is a fundamental principle that was...
May 4, 2012
Leadership Cloud or Flood Coming?
›
I came across two very interesting and concerning studies on cloud computing--one from last year and the other from last month. Here...
April 24, 2012
Cyberwar--Threat Level Severe
›
! This video is of an incredible opening statement by Rep. Michael McCaul (R-TX), Subcommittee Chairman on Oversight, Investigations, and ...
April 13, 2012
Be Who You Are
›
I watched an interesting TED video presented by Brene Brown, who has a doctorate in social work and is a author many times over--she tal...
April 15, 2011
When Butterflies Sting
›
Stage freight (aka "performance anxiety") is one the most common phobias. While often attributed to children, this is really ...
January 9, 2011
The Center Of Gravity Is Information
›
Center of Gravity (COG) is a military concept that Dr. Joseph Strange defines as “primary sources of moral or physical strength, power, and ...
›
Home
View web version