Top Qualities of an Effective IT Leader

Information technology and software development requires incredible creativity and vision. A leader in Information Technology has to really push for excellence and value in their products to make sure that they make a mark on the world. This article digs into some common characteristics we see in strong IT leaders. Having a Vision An IT leader needs to have a clear vision in order to lead his or her company in to the future. That cannot be compromised because tech is a field that is more concrete and less abstract than other fields like social sciences. Hence, the vision [...]

Technology Spotlight: Vulnerability Management and Penetration Testing

Vulnerability management (Blue Team), Penetration testing (Red Team) are like two sides of a coin, one without the other is incomplete. News Flash: When it comes to security, incomplete equals "at risk". We see this duality in every industry where assurance is required.  Such as in industrial design and testing. In the cyber world management must begin with assessing what the potential for damage to brand integrity will be should a breach occur. Loss of customer or public confidence? Loss of trade secrets? Leakage of Personally Identifiable Information? Once management embraces the danger a breach represents to their business, [...]

What Happens During a Cybersecurity Assessment?

When most people think of cybersecurity, they think of anti-virus and firewalls. While that is part of cybersecurity, it is equivalent to thinking of a tire or a windshield when thinking about an automobile. Cybersecurity is the comprehensive ability of an organization to identify, protect, detect, respond and recover from cyberincidents. These cyberincidents have the potential to damage brand integrity through data loss or leakage. Cybersecurity assessments are an important compoent to any greater cybersecurity strategy. This article discusses what happens in a cybersecurity asessment. A Cybersecurity Posture Assessment is standardized process used to define, evaluate, assess and document [...]

Technology Spotlight: Disaster Recovery vs. Business Continuity

Considering the recent wave of disasters, organizations have put contingency plans in place to deal with them. Organizations now want to deal with disasters in a manner, which safeguards their best interests, without requiring a major upheaval. Companies need to consider what they need to do for disaster recovery and business continuity. While they cross over quite a bit, disaster recovery and business continuity are not the same. When it comes to planning for disaster recovery, businesses are confronted by two different methods – Disaster Recovery Plans and Business Continuity Planning. There is a basic difference between both of [...]

Your Mouse is Dead. New Interfaces are Coming!

First, it was punch cards, before the next wave of technological advancement brought us the mouse and keyboard. If truth be told, the kind of systems and tools that we use for engaging with our computers are very much responsible for allowing us to build a modern world around us. When we talk about those tools and systems, we sure have come a very long way. But when we talk about UI (User Interfaces), the means we use to interact with our computer systems, it’s only now that we have started to see advancement in this department over time. New [...]