Quantcast
Channel: Logical Operations Blog
Browsing all 101 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Who's Behind All the Phishing?

The Verizon 2016 Data Breach Investigations Report (follow the link to a page from which you can download it) is out. This year, it is based on a dataset of 64,199 incidents that resulted in 2,260...

View Article



Image may be NSFW.
Clik here to view.

The Six Top Sources of Human Cybersecurity Error

Last year, there were more than 25 major data breaches, including OPM, the IRS, Ashley Madison, Anthem, CVS, Walmart, and Scottrade. Business news was dominated by these events. But it occurs to me...

View Article

Image may be NSFW.
Clik here to view.

A New Way to Look at Hacking

A new white paper from Hewlett Packard Enterprise advances a novel perspective on cybercrime. The Business of Hacking (you can download the report for free) examines cybersecurity from the standpoint...

View Article

Image may be NSFW.
Clik here to view.

ITIL® and the Renewal of National Productivity

A friend of mine once interviewed for a job as administrative assistant to the CEO of a photoelectric sensor manufacturing firm. In a series of interviews, she met with the incumbent in the job, who...

View Article

Image may be NSFW.
Clik here to view.

Famous Last Words of Cybersecurity Management

We have reached the point that businesses are paying attention to cybersecurity, which is a good thing. All over the country, organizations are promulgating policies, conducting training programs,...

View Article


Image may be NSFW.
Clik here to view.

How Cybersecurity Is a Sales Job

A recent blog posting at the InfoSecurity website suggests that instead of moaning about how employees are the weakest link in your security chain, you take steps to make them the strongest....

View Article

Image may be NSFW.
Clik here to view.

How to Use the Cost of a Data Breach to Justify an Incident Response Team

The 2016 Cost of Data Breach Study: Global Analysis has been released, and you can download it here (registration required). Sponsored by IBM and performed by the Ponemon Institute, this year’s study...

View Article

Image may be NSFW.
Clik here to view.

4 Big Challenges in Moving Your Business to the Cloud, 1 Major Step to...

I see four big business challenges in moving to the cloud:1. Selecting a Vendor. There are lots of cloud providers, and each offers its own unique blend of services, stability, and commitment. Whatever...

View Article


Image may be NSFW.
Clik here to view.

Why It's Never Too Late for Vendor-Neutral Cloud Training

On this blog lately, I have been trying to make the case for vendor-neutral cloud training. Vendor-neutral cloud training, of course, can help your organization embrace the best practices in cloud...

View Article


Image may be NSFW.
Clik here to view.

The Ashley Madison Hack — One Year Later

Cybersecurity is more than a technical operation. It is a human undertaking, and its failures lead to human cost. Few events illustrate this better than the Ashley Madison hack, which I blogged about...

View Article

Image may be NSFW.
Clik here to view.

Logical Operations and Digital Marketing Institute

In the 1989 film, Field of Dreams, an Iowa corn farmer named Ray Kinsella hears a voice telling him to build a baseball diamond in his field. Ray builds the field, and the spirit of legendary ball...

View Article

Image may be NSFW.
Clik here to view.

Time and Cybersecurity Training

The threat to your organization of a data breach is real, as are the limitations of pure technology in protecting you. Of the top six sources of cybersecurity error, four of them… general...

View Article

Image may be NSFW.
Clik here to view.

A New and Potent Cyber-Scam

A couple months back, I discussed with you the BEC, or “business email compromise,” scam. According to an FBI alert, “The schemers go to great lengths to spoof company e-mail or use social engineering...

View Article


Image may be NSFW.
Clik here to view.

Cloud Computing Skills

The message that IT pros need to understand cloud computing as a discipline rather than as a proprietary platform seems to be catching on. A recent article in InformationWeek titled “9 Cloud Skills IT...

View Article

Image may be NSFW.
Clik here to view.

Cloud Computing: Skills Before Bandwagon

Conventional wisdom suggests that cloud computing offers several technical advantages over traditional IT systems:scalabilitysimplified managementreduced maintenanceincreased reliabilityBut let’s face...

View Article


Image may be NSFW.
Clik here to view.

Instinct vs. Business Intelligence

Instinct is the propensity of a creature to engage in a defined behavior when presented with a certain stimulus. Sea turtles, for example, are born on the beach, but once hatched, they make their way...

View Article

Image may be NSFW.
Clik here to view.

Coping with the Surge of Ransomware

According to a report published this summer by Kaspersky Labs, the use of ransomware cryptors is enjoying explosive growth. A ransomware cryptor is a piece of malware that infects your computer and...

View Article


Image may be NSFW.
Clik here to view.

New Options for Your Career in VMware

Today’s PC server hardware was designed to run a single operating system, and it doesn’t matter how many processors or cores you have. This means most machines have a great deal of capacity going...

View Article

Image may be NSFW.
Clik here to view.

Notes in the Margin: It’s Possible with CHOICE

In 2011, Wiredran an article titled “5 Reasons Why e-Books Aren’t There Yet.” It was a good article and fairly amusing: one of the reasons was that you can’t use eBooks to decorate your home(!). The...

View Article

Image may be NSFW.
Clik here to view.

Is It Time to Move Beyond Passwords?

Last year in Quora (a question-and-answer site where questions are asked, answered, edited, and organized by its community of users), a member asked the question“How do hackers hack your passwords?”...

View Article
Browsing all 101 articles
Browse latest View live




Latest Images