Gamification is an engaging way to motivate security operations center analysts to develop their incident response skills and situational awareness.
Ransomware is a type of malware or software program designed to lockup a device that is connected to the Internet, limiting access to the device and/or data in demand for a ransom. It has been around for over a decade...
When done right, collaboration gives the entire business everything that’s required to compete in the digital economy. So why is it managed so poorly? Read the full article at: www.digitalistmag.com
Ransomware is a type of malware or software program designed to lockup a device that is connected to the Internet, limiting access to the device and/or data in demand for a ransom. It has been around for over a decade now and cyber criminals have used that time to incorporate [...]
Exclusive research from the CIO Executive Council shines a light on how IT leaders are defining and driving IT innovation. Register now to download the free report.This research article has some interesting insights into the thinking and beliefs around defining and driving IT innovation. The principles they discuss are relevant, not just for IT, but for any organization trying to develop a culture of innovation. As mentioned in the article, “Innovation is change”. To be successful, leaders have to be change agents and develop a culture of trust, transparency and flexibility. Read the full article at: www.cio.com
New Year's resolutions aren't just for your personal life, new year's resolutions can also transform your work life. Here are 4 new year's resolutions to build your high performing team. Read the full article at: www.cio.com
I bought my dad an Amazon Alexa device for his birthday. He surprised me when he asked, “Aren’t these smart devices the kind of thing that brought the Internet down last week?” Now that cyber criminals are targeting connected household items, people that weren’t necessarily aware of the importance of [...]
By day I am a change and project management consultant; helping clients to successfully rollout and gain adoption of new processes and technologies. This can present challenges, but it is always rewarding. A new responsibility that I have is to migrate our consulting company, Expressworks, from an on-prem environment to [...]
Having just attended the insiderthreat Summit last month I was surprised at how much focus was on identifying behavioral characteristics of malicious insider threats. Don’t get me wrong, proactively identifying malicious insiders is a critical part of an Insider Threat Program, but I believe that you also must consider the [...]