Manage Numerous IT Projects With No Resource Constraints

IT resource management is crucial in chaotic environments where multiple projects collide…  The most obvious challenge of IT managers is to make sure they meet deadlines and projects deliverables in a timely manner. This is more tangible in environments where tons of big and small projects overlap in shared resources. That is a sign of resource constraint. By resource, I mean IT… Continue reading Manage Numerous IT Projects With No Resource Constraints

GDPR Facts & Challenges

Let’s list some of GDPR facts and challenges: Estimated time of engagement will be end of 2018 All recent cyber incidents in US made Europe totally suspicious to US privacy and cyber reliability GDPR is simply a data privacy compliance regime to force other countries to comply with Europe. Cyberspace was 100% ruled by US… Continue reading GDPR Facts & Challenges

Published
Categorized as GDPR

Does JavaScript Pose A Security Risk?

Javascript is a silent threat! I no longer am able to imagine the current structure of the web without JavaScript. This is about online applications in form of traditional websites, otherwise traditional web interfaces won’t be able to handle the applications and web would collapse without JS! That does not mean I am a fan… Continue reading Does JavaScript Pose A Security Risk?

GDPR: Primary Actions

GDPR: start from scratch with these primary steps Following steps can be helpful identifying where you are in GDPR Compliance Journey. Consider that as a quick audit towards a more comprehensive gap analysis to understand your current situation: Role identification: Identify whether you are a a data controller, data processor, or both. Identify all data… Continue reading GDPR: Primary Actions

Published
Categorized as GDPR

IT System Administration Good Exercises: Event Lookup!

Computer administration is all about how the system and network is running at the moment. What else could be more important than how zeros and ones are really interacting in background? System and Network administration starts and ends with lowest level of these environment. Those place that we barely look are the source of system… Continue reading IT System Administration Good Exercises: Event Lookup!

GDPR In A Glance

A Summary of New European Union General Data Protection Regulation The story of this legislation is to protect the personal data of the EU citizens, including how that data is collected, stored, processed/used, and destroyed once it is no longer needed. The EU General Data Protection Regulation (GDPR) is the most important change in data… Continue reading GDPR In A Glance

Published
Categorized as GDPR Tagged

Why Environment Constantly Faces Insecurities?

There is no doubt that security is not a project, there is no end and we need to constantly evolve but does it seem to you that you may put more effort you expect? You would sense some doubt about why you are constantly running after fixing issues, but is this the way security works? … Continue reading Why Environment Constantly Faces Insecurities?

The Fine Art of Network Security Configuration: Micro Segmentation

Micro segmentation is the particle of an effective network segregation Network security administration barely leverages a concept which basically has been there forever and could literally saves them forever when dealing with security of network services, and that is nothing but micros segmentation.  I usually bring practical examples to my workshops so students are able… Continue reading The Fine Art of Network Security Configuration: Micro Segmentation