Cybersecurity Remediation Plan: Breach Planning and What You Should IncludeForwarding thinking is often the saving grace of many organizations. Seeing what is coming beyond the horizon can save a failing business…Sep 24, 2021Sep 24, 2021
What is a SIEM Solution and how does it Work?Comprehensive security beings with a Securtiy Incident and Event Management (SIEM) solution.Sep 22, 2021Sep 22, 2021
What Should my Information Security Program Look Like?Your cybersecurity infrastructure is only as good as the strategy that backs it.Sep 22, 2021Sep 22, 2021
What are the GDPR Privacy Policy RequirementsIt is impossible nowadays to run an online business without hearing about privacy policies. The General Data Protection Regulation (GDPR)…Sep 22, 2021Sep 22, 2021
Taking a Team Approach to IT Infrastructure SecurityA machine starts no business; it will always take the input and creativity of people. You could say that the people are the lifeblood of…Sep 22, 2021Sep 22, 2021
Becoming a Blockchain Developer: Starting from Scratch with Ivan on Tech Academy Javascript Course…How many blockchain developers does it take to change a light bulb?Jul 8, 2021Jul 8, 2021
Encryptonomics: a vision of a tokenized economyI still have fond memories of the days, where my extended family and I, would take our summer trips down to the beaches of San Felice…Oct 24, 2018Oct 24, 2018
A humble opinion on BlockchainHumanity finds it self in a unique position to choose the outcome of this seemingly ever growing stage of technological advancement. It…Oct 8, 2018Oct 8, 2018