article thumbnail

Cybersecurity Canon Candidate Book Review: Defensive Security Handbook – Best Practices for Securing Infrastructure

Palo Alto Networks

Cyber Canon Book Review: “Defensive Security Handbook – Best Practices for Securing Infrastructure” (2017), by Lee Brotherston and Amanda Berlin. Book Reviewed by: Helen Patton, The Ohio State University CISO. Please write a review and nominate your favorite. . The Cybersecurity Canon is a real thing for our community.

article thumbnail

Why Enterprises Need to Prepare for Russian Cyberattacks – and Four Ways to Do It

Ivanti

Russia’s offense strategy includes both cyber and kinetic warfare.?Before Before the ground offensive started, Russia allegedly took steps to invade Ukraine’s digital infrastructure, with potentially catastrophic and chaotic impacts on critical systems and operations. Tightening access to all business systems is a good place to start.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

4 common DEIB mistakes startups can avoid

TechCrunch

Mistake 1: Your hiring strategy is based on referrals. If you want to be a company with a future, you will need a real hiring strategy. Without a basic job-level system in place, hiring, compensation and promotion decisions are made based on completely subjective criteria. You can’t afford that. Get started now. Don’t wait!

Policies 188
article thumbnail

Talking #BlackLinkedIn and DEI with Patricia Gatlin

Hacker Earth Developers Blog

She is also the curator of #BlackLinkedin where she mentions how biased the LinkedIn algorithm is due to which her DEI posts were not getting the same exposure as everyone else. Algorithmic bias is systemic and it creates unfair circumstances for particular users and promotes access to privilege.

article thumbnail

Book review: Escaping the Build Trap by Melissa Perri

Wolk Software Engineering

A couple of days ago I finished reading Escaping the Build Trap by Melissa Perri and, as usual, I would like to share a review with the community. 1 The value exchange system. 2 Constraints on the value exchange system. PART III: Strategy. 10 What is strategy? PART III: Strategy. 10 What is strategy?

article thumbnail

A Closed-Loop Strategy Execution System

Six Disciplines

In their 2008 book "The Execution Premium: Linking Strategy to Operations for Competitive Advantage" (Harvard Business School Press), Harvard professors Dr. Robert S. Breakdowns in a company’s management system, not managers’ lack of ability or effort, are what cause a company’s underperformance. Align Systems ).

article thumbnail

A Closed-Loop Strategy Execution System

Six Disciplines

In their 2008 book "The Execution Premium: Linking Strategy to Operations for Competitive Advantage" (Harvard Business School Press), Harvard professors Dr. Robert S. Breakdowns in a company’s management system, not managers’ lack of ability or effort, are what cause a company’s underperformance. Align Systems ).