Would you put more complex firewall rules when internal nodes are vulnerable due to initial default insecure setup, or setup numerous security tools while setting up more and more insecure nodes at the same time?!
Author: Kaveh Mofidi
While he enjoys working with computers and dealing with information security, he believes that our challenges, as humans, extend far beyond infosec and even technology. He says: "The real task is to discover solutions for unlimited clean energy, drinkable water, and addressing the root causes of hunger, war, and injustice. Our primary goal should be to keep our planet livable; that is the true challenge we face on the Earth!"
Five signs IT is overwhelmed with operations
There are signs before your IT department faces a disaster or worse, jeopardize your business by affecting tech operations in different departments. Those are signs of an overwhelmed IT so let’s take a look at common signs and symptoms: 1) Lack of resourcesWhenever your IT staff are always talking about lack of resources be aware… Continue reading Five signs IT is overwhelmed with operations
Five Reasons to Start Your SIEM Initiative Today
Regardless of how SIEM in today’s cybersecurity marketing campaign is driven mainly by Compliance, which solutions is the best, and whether it should be managed or on-premises, Security Information and Event Management is conceptually accepted among security professionals so here’s my top reasons to consider SIEM implementation as one of your cybersecurity initiatives: Another tool… Continue reading Five Reasons to Start Your SIEM Initiative Today
Privacy: Does Cyberspace Leave Any For Us?!
What does ‘Privacy’ exactly mean to you, and is there anything left for us in cyberspace?
Vulnerability Management Elements
being able to dynamically connect and correlate data to different part of a vulnerability management interface is crucial.
Manage Numerous IT Projects With No Resource Constraints
IT resource management is crucial in chaotic environments where multiple projects collide… The most obvious challenge of IT managers is to make sure they meet deadlines and projects deliverables in a timely manner. This is more tangible in environments where tons of big and small projects overlap in shared resources. That is a sign of resource constraint. By resource, I mean IT… Continue reading Manage Numerous IT Projects With No Resource Constraints
GDPR Facts & Challenges
Let’s list some of GDPR facts and challenges: Estimated time of engagement will be end of 2018 All recent cyber incidents in US made Europe totally suspicious to US privacy and cyber reliability GDPR is simply a data privacy compliance regime to force other countries to comply with Europe. Cyberspace was 100% ruled by US… Continue reading GDPR Facts & Challenges
Does JavaScript Pose A Security Risk?
Javascript is a silent threat! I no longer am able to imagine the current structure of the web without JavaScript. This is about online applications in form of traditional websites, otherwise traditional web interfaces won’t be able to handle the applications and web would collapse without JS! That does not mean I am a fan… Continue reading Does JavaScript Pose A Security Risk?
EU GDPR And Businesses
New European Union General Data Protection Regulation affects most US businesses
GDPR: Primary Actions
GDPR: start from scratch with these primary steps Following steps can be helpful identifying where you are in GDPR Compliance Journey. Consider that as a quick audit towards a more comprehensive gap analysis to understand your current situation: Role identification: Identify whether you are a a data controller, data processor, or both. Identify all data… Continue reading GDPR: Primary Actions