Cybersecurity Management-Business Software-Technology

Cybersecurity Tabletop Exercises: From Planning to Execution

Cybersecurity is a trending business topic due to the incredible growth of the IT industry and the Internet. It affects almost every professional domain, whether in the business, healthcare, or financial sectors. Perhaps the biggest risk facing companies today is having their IT systems compromised in some way involving secure data – a very broad vulnerability. To limit or prevent harm, a company’s leaders can engage in “tabletop exercises” to run through common scenarios. These…

Continue reading

Cybersecurity Management-Business Software-Technology

The Smartest Person in the Room: The Root Cause & New Solution for Cybersecurity

A career in technology requires acumen in a specific domain. However, as one’s career builds, people skills (so-called “soft skills”) come more to the fore. Suddenly, being the “smartest person in the room” is of limited benefit. Indeed, it can be a handicap because that means that you don’t have anyone to counterbalance your ideas and to collaborate with. Cybersecurity CEO Christian Espinosa tries to guide those in technology how to transition from someone proficient…

Continue reading

Cybersecurity Management-Business Software-Technology

Cybersecurity: Insights You Need from Harvard Business Review

As an IT professional, I do not reside in the intended audience of this book. It is geared towards business leaders, not software developers. It provides a high-level and non-technical overview of the field of cybersecurity. Through several authors, it makes the case that cybersecurity cannot be overlooked by all C-suite executives, even in non-technology-based companies. That case is underscored by the direct impact cybersecurity has on a business’ bottom line. Having in-depth technical experience…

Continue reading

Cybersecurity Indie Software-Technology

Cybersecurity: Advanced and Effective Measures to Secure Your Cyber Networks

This book attempts to provide basic and practical measures that can guide an IT professional into more security expertise. It claims that it can teach the reader methods on how to detect vulnerabilities. It succeeds in surveying the technologies relevant to the task, but it falls short in the execution of writing. Lewis, no doubt, is a good security professional. However, he does not explain a topic thoroughly. He is too terse and concise. He…

Continue reading