About Rafeeq Rehman
Consultant, Author, Researcher.
Manufacturers have been building products (or things) for a very long time. A major shift is in the competitive landscape is about making these products or things “smart”. Now, people not only need a light bulb, but they want a … Continue reading →
Posted in IoT
|
Tagged IoT, strategy
|
IoT is all about connecting devices and machines to the Internet who can talk to each other, collect and share data, analyze the data, and bring business value out of data analytics. A fair argument is that we have been … Continue reading →
How brain works? can we learn after childhood? What is our mental capacity? What are the myths and what is reality? This article from McKinsey & Company sheds some light on these questions. “Misconceptions about the brain are embedded in … Continue reading →
Software Defined Networking or SDN brings a paradigm shift and new promises about how networks are designed and operated. The biggest change is separating the control plane from the data forwarding plane, which, in the current network paradigm are tied … Continue reading →
Posted in InfoSec
|
Tagged SDN
|
Note: There is an updated CISO Mind Map for 2018 on this URL As the InfoSec landscape changes constantly, so do the responsibilities of a CISO. Virtual Security Appliances are becoming more common in the Cloud environment. Similarly IoT and … Continue reading →
The Verizon 2015 DBIR just released today, and as someone said. It is “the best” DBIR ever. The report provides a number of important findings and new data analysis especially around the cost of data breaches. The report contains analysis … Continue reading →
There are almost as many information security reports out there as the number of security vendors. Keeping up to date about these reports could be a challenge and sometimes these reports may become an information overload for security professionals. Verizon … Continue reading →
Posted in InfoSec
|
Tagged DBIR, infosec, Reports
|
SWOT (Strengths, Weaknesses, Opportunities, Threats) analysis is an industry standard way of analyzing current situation (marketing, business strategy, risk assessment, etc). In many cases, SWOT analysis provides foundation for creating business strategy. Following is a short description of how we … Continue reading →
The role of CISO, and other InfoSec professionals, has morphed into a critical business function. One should expect getting involved in “business” discussion often, and at higher levels. Understanding and speaking business language is more important than ever for success … Continue reading →
IDC (and other analysts) predict information security, threat intelligence, data analytics, hunting, among others, are expected to grow and become more important part of a CISO’s strategy in 2015 and beyond. If one has money and backing of a large organization, … Continue reading →