IT resource management is crucial in chaotic environments where multiple projects collide… The most obvious challenge of IT managers is to make sure they meet deadlines and projects deliverables in a timely manner. This is more tangible in environments where tons of big and small projects overlap in shared resources. That is a sign of resource constraint. By resource, I mean IT… Continue reading Manage Numerous IT Projects With No Resource Constraints
Author: Kaveh Mofidi
While I enjoy working with electronics, computers, and the fields of information and cybersecurity, I believe our challenges as humans extend far beyond infosec—and even beyond technology itself. The real task, I would argue, is to discover solutions for unlimited clean energy, drinkable water, practical waste management and to address the root causes of hunger, war, and injustice on our beautiful little planet. Our primary goal—each of us—should be to keep Earth livable. That is the true challenge we face.
GDPR Facts & Challenges
Let’s list some of GDPR facts and challenges: Estimated time of engagement will be end of 2018 All recent cyber incidents in US made Europe totally suspicious to US privacy and cyber reliability GDPR is simply a data privacy compliance regime to force other countries to comply with Europe. Cyberspace was 100% ruled by US… Continue reading GDPR Facts & Challenges
Does JavaScript Pose A Security Risk?
Javascript is a silent threat! I no longer am able to imagine the current structure of the web without JavaScript. This is about online applications in form of traditional websites, otherwise traditional web interfaces won’t be able to handle the applications and web would collapse without JS! That does not mean I am a fan… Continue reading Does JavaScript Pose A Security Risk?
EU GDPR And Businesses
New European Union General Data Protection Regulation affects most US businesses
GDPR: Primary Actions
GDPR: start from scratch with these primary steps Following steps can be helpful identifying where you are in GDPR Compliance Journey. Consider that as a quick audit towards a more comprehensive gap analysis to understand your current situation: Role identification: Identify whether you are a a data controller, data processor, or both. Identify all data… Continue reading GDPR: Primary Actions
IT System Administration Good Exercises: Event Lookup!
Computer administration is all about how the system and network is running at the moment. What else could be more important than how zeros and ones are really interacting in background? System and Network administration starts and ends with lowest level of these environment. Those place that we barely look are the source of system… Continue reading IT System Administration Good Exercises: Event Lookup!
GDPR In A Glance
A Summary of New European Union General Data Protection Regulation The story of this legislation is to protect the personal data of the EU citizens, including how that data is collected, stored, processed/used, and destroyed once it is no longer needed. The EU General Data Protection Regulation (GDPR) is the most important change in data… Continue reading GDPR In A Glance
Three Reasons To Trust SECURE TARGET
Articles will be revealing in many aspect of information security and information technology in general, but why would you trust SECURE TARGET?
Why Environment Constantly Faces Insecurities?
There is no doubt that security is not a project, there is no end and we need to constantly evolve but does it seem to you that you may put more effort you expect? You would sense some doubt about why you are constantly running after fixing issues, but is this the way security works? … Continue reading Why Environment Constantly Faces Insecurities?
The Fine Art of Network Security Configuration: Micro Segmentation
Micro segmentation is the particle of an effective network segregation Network security administration barely leverages a concept which basically has been there forever and could literally saves them forever when dealing with security of network services, and that is nothing but micros segmentation. I usually bring practical examples to my workshops so students are able… Continue reading The Fine Art of Network Security Configuration: Micro Segmentation