About Rafeeq Rehman
Consultant, Author, Researcher.
IoT is all about connecting devices and machines to the Internet who can talk to each other, collect and share data, analyze the data, and bring business value out of data analytics. A fair argument is that we have been … Continue reading →
Like this:
Like Loading...
How brain works? can we learn after childhood? What is our mental capacity? What are the myths and what is reality? This article from McKinsey & Company sheds some light on these questions. “Misconceptions about the brain are embedded in … Continue reading →
Like this:
Like Loading...
Software Defined Networking or SDN brings a paradigm shift and new promises about how networks are designed and operated. The biggest change is separating the control plane from the data forwarding plane, which, in the current network paradigm are tied … Continue reading →
Like this:
Like Loading...
Posted in InfoSec
|
Tagged SDN
|
Note: There is an updated CISO Mind Map for 2018 on this URL As the InfoSec landscape changes constantly, so do the responsibilities of a CISO. Virtual Security Appliances are becoming more common in the Cloud environment. Similarly IoT and … Continue reading →
Like this:
Like Loading...
The Verizon 2015 DBIR just released today, and as someone said. It is “the best” DBIR ever. The report provides a number of important findings and new data analysis especially around the cost of data breaches. The report contains analysis … Continue reading →
Like this:
Like Loading...
There are almost as many information security reports out there as the number of security vendors. Keeping up to date about these reports could be a challenge and sometimes these reports may become an information overload for security professionals. Verizon … Continue reading →
Like this:
Like Loading...
Posted in InfoSec
|
Tagged DBIR, infosec, Reports
|
SWOT (Strengths, Weaknesses, Opportunities, Threats) analysis is an industry standard way of analyzing current situation (marketing, business strategy, risk assessment, etc). In many cases, SWOT analysis provides foundation for creating business strategy. Following is a short description of how we … Continue reading →
Like this:
Like Loading...
The role of CISO, and other InfoSec professionals, has morphed into a critical business function. One should expect getting involved in “business” discussion often, and at higher levels. Understanding and speaking business language is more important than ever for success … Continue reading →
View post to subscribe to site newsletter.
Like this:
Like Loading...
IDC (and other analysts) predict information security, threat intelligence, data analytics, hunting, among others, are expected to grow and become more important part of a CISO’s strategy in 2015 and beyond. If one has money and backing of a large organization, … Continue reading →
Like this:
Like Loading...
Many people have asked for PDF version of CISO Mind Map so that they can print it. I am attaching three PDF sizes, all of these are at 300 dpi resolution. Choose whichever you like and print it. While printing, … Continue reading →
Like this:
Like Loading...
Posted in Leadership
|
Tagged mind map
|