Welcome to The UltraTech Zone Sign in | Join | Help

Talking Out Loud with ASB

Views on Life, Technology and Everything, by ASB (aka Logik!)...

My Profile

Andrew S. Baker (ASB)

News

  • Platform: CS v2.1 SP2...

    Get a FREE phishing filter for your domain!

    Who links to my website?

    Pando Pro

Browse by Tags

All Tags » Business   (RSS)

A look at Microsoft’s SIR v14
So…. I finally had a chance to finish reading the latest full edition of Microsoft’s latest Security Intelligence Report . There’s a lot of really good info in the report. The executive summary also does a good job of highlighting key points.  That Read More...
Dueling Business Mindsets
If there is one lesson that technologists need to understand in order to be successful, it’s that business is ultimately more about people than about process or technology .  At the end of the day, how people think, behave and operate will have be Read More...
Wise Security Investment Approaches
A holistic approach to information security needs to address a corporate strategy for buying or building solutions. Such a strategy will have an impact on how a company looks at staffing and technology investments. There are two basic ways to look at Read More...
The Futility of Blaming IT
In recent years, it has become popular sport to blame information technology (IT) departments and IT leaders for failures – real or imagined – which adversely impact business operations.  Even some technology trade journals seem unable to get through Read More...
Reading Between the Lines of Breach Notifications
Back in September 2012, I wrote two articles for Point2Security on how to effectively handle breach notifications: The Who of Post-Breach Communication Post-Breach Communication: The Importance of How & When Sadly, to many organizations are doing Read More...
Job Hunting: It’s All About Relationships
Earlier this week, I read an article about unemployment and the struggles of those coming out of college and graduate school who are seeking jobs. A surprising number of people were simply spouting the rhetoric that people who don’t have jobs are simply Read More...
Why We Have No Online Privacy
Earlier today, as I read a very self-serving article lamenting how online growth will be killed due to impending “Do Not Track” legislation , it became very clear to me why online privacy in the US is almost entirely non-existent. As a society in the Read More...
Dear Recruiter: Help Me Help You
As we head into the second half of 2012, I average about 3 to 4 calls/emails from recruiters per week.  In contrast to the overall job market which is still not doing so well, the market for information technology professionals is quite lively, especially Read More...
Making the Most of Social and Professional Networking
As social/professional networking continues to proliferate, users and organizations alike, seek to find the ways to make the most of the growing trend.  A recent infographic shows just how complicated it can be for marketing departments to try and Read More...
My Workplace Technology Wish List
It is not every day that one gets an opportunity to put together a wish list of technology solutions that could be used to drive a modern, highly productive workplace. So, let’s begin our If Money Were No Object quest… Every office has desktops and notebooks, Read More...
Where Netflix Went Wrong: Corporate Communications
The good folks at Netflix recently announced a huge price hike for their customers , as they separate their DVD and streaming businesses into distinct product offerings. If you look at the comments on the blog post where they made the announcement , you Read More...
To Disclose or not to Disclose
…that is the question. Every time a software vendor experiences a vulnerability or releases patches for a serious security issue, the debate about Full Disclosure or Responsible Disclosure gains a little more steam. Just how much information should a Read More...
Just ask Sony…
Why should you take your organization’s information security posture seriously? Just ask Sony.  It has been estimated that Sony will spend more than $170 million dollars due to the recent breaches they have suffered.  Personally, I think that Read More...
Managing Technology-based Risks
Risks exist. You would think that this is so obvious as to not need saying, but too many people appear to operate as though downplaying or ignoring risks have any impact on their reality. That sign announcing “bridge out” isn’t really concerned with how Read More...
Reactive Security: Feel the pain in 2011+
We are only one third of the way into 2011, but we have had some of the largest information security breaches of the decade – and the trend does not appear to be slowing down. Here are just a few of the biggest reports for the year: http://www.eweek.com/c/a/Security/RSA-SecurID-Breach-Shows-Why-Everybody-Must-Stay-Vigilant-595858/ Read More...
More Posts Next page »