Social Engineering Attacks and How You Can Protect Yourself

Social engineering, in the context of information security, is the art of manipulating people so they give up confidential information. This is a type of confidence trick for the purpose of vital information gathering. It is a term that describes a non-technical attack that relies on human interaction and tricking people to break normal security Read More …

Hopefully, you've found this post helpful. Please share with others:

The 5 Ted Talks every leader should watch

I’ve always been a big fan of TED (Technology, Entertainment, Design) Talks. If you’ve never watched a TED Talk before, you are missing out on one of the most creatively-stimulating, informational series available today. I’ve picked out 5 good ones on ‘leadership’ that I think every leader should either watch or listen to at some Read More …

Hopefully, you've found this post helpful. Please share with others:

Real-time visibility into global cyber attacks

Already popular among security professionals as a live threat visualization, the Norse Live Attack Map has been rebuilt from the ground up to be more visually appealing and entertaining, and to provide deeper insight into the source and nature of cyber attacks. It features a completely redesigned interface that lets users zoom in on geographic Read More …

Hopefully, you've found this post helpful. Please share with others:

The Ultimate Guide to the Perfect LinkedIn Profile

I joined LinkedIn back when you had to get invited to join and there were less than one million users on it. As of October 2015, LinkedIn reported more than 400 million acquired users in more than 200 countries and territories. Over the years, I have gained some knowledge on how to maximize the use Read More …

Hopefully, you've found this post helpful. Please share with others:

Launch of the Machine Network

On March 9th, I attended an interesting event at the University of Texas at Dallas which was presented by Ingenu. The smart folks from Ingenu were there to talk about the “Machine Network”. Dallas-Ft. Worth is about to receive a cutting edge network that will change the way the Internet of Things (IoT) and Machine-to-Machine (M2M) communications Read More …

Hopefully, you've found this post helpful. Please share with others:

Favorite project management books

Recently on one of my LinkedIn groups for project managers, there was a discussion on favorite project management books.  There were lot of good recommendations by the group members and I am providing the final list below based on ranking – • The Art of Project Management by Scott Berkun • Agile Project Management by Read More …

Hopefully, you've found this post helpful. Please share with others:

Journey to the Cloud

For several years now there seems to be hype and buzz surrounding cloud computing. It appears 178 million times on a Google search.  Apple, Google, Amazon, IBM and Microsoft are aggressively pushing into cloud computing, in a race to reel customers into their media ecosystems. Recent advertising from these companies would suggest the cloud is a Read More …

Hopefully, you've found this post helpful. Please share with others:

The need for Enterprise Architecture

Enterprise architecture has become a loaded term, and it means different things to different people. So, let’s have a look at the definition of enterprise architecture (EA). According to TechTarget, an enterprise architecture (EA) is a conceptual blueprint that defines the structure and operation of an organization. The intent of an enterprise architecture is to Read More …

Hopefully, you've found this post helpful. Please share with others:

A close look at SANS: 2015 State of Application Security Report

I used to work as a software developer while back. But things have changed a lot since then. The industry has experienced so many high-profile application security breaches that resulted in the compromise of personally identifiable information, software developers now days have to become more aware of how important—and how hard—it is to write secure Read More …

Hopefully, you've found this post helpful. Please share with others:

Is Your Company Data Safe on the Cloud?

Cloud computing is a model for enabling ubiquitous network access to a shared pool of configurable computing resources. In the last decade, cloud services have rapidly become one of the most defining technologies in IT and the cloud migration exodus has begun. For many, the benefits of cloud computing outweigh the risks. Cloud computing directly addresses Read More …

Hopefully, you've found this post helpful. Please share with others: