Data flow diagrams are visual illustrations of processes that can help elevate your business in short order.
Thoughts on contributing to a graduate course on Agile in Design Thinking cultures.
Here’s a friendly list of DO’s and DON’Ts to help protect you and yours this holiday season. Please – check it twice!
Don’t buy a VPN until you read this.
It’s easy to forget the Internet was built to share information across a global network, not keep it private. Sharing has become an essential part of life and that’s not going to change any time soon. Whenever we have something to share, in any format, there are a multitude of ways, tools, and modes to do that. Even stuff there was no intention of ever sharing somehow ends up out there. So, there’s pros and cons to all of this sharing.
Most people have no idea whether they have or haven’t used their Facebook account to log into other sites and services across the Web. Here’s some practical steps to find out and mitigate the risks.
Resilience Strategy asks important questions like: “Are privacy and security the same thing?”
Resilience is about protecting our interests, like privacy, and being prepared to act when unplanned events compromises them. California is leading the way in the US where protecting our privacy is concerned. What states will follow?
I recently had the honor and pleasure of sitting on a panel beside some of the most expert talent in the industry to discuss another polarizing topic: Social Engineering.