There are moments in public life that require us to pause, take a collective breath, and ask ourselves—what kind of society are we striving to build? Recently, at a public rally, the comment was made that there’s “literally a floating island of garbage in the middle of the ocean… I think it’s called Puerto Rico.” This racially charged statement has not only struck a nerve but has crossed a line. It has opened old wounds of prejudice and reanimated hurtful stereotypes that, for too long, have plagued Puerto Rican culture and history. Such words, spoken in jest, have immediate consequences that ripple through communities, especially when Puerto Rico is a U.S. territory brimming with resilience, talent, and hospitality that define the Caribbean experience.
0 Comments
The Real Cost of Compliance: Why Following Cybersecurity Guidelines Might Not Protect Your Business9/5/2024 In today’s digital world, businesses are under immense pressure to comply with a myriad of cybersecurity regulations and frameworks, from the FFIEC Cybersecurity Assessment Tool (CAT) to the NIST Cybersecurity Framework (CSF) and ISO/IEC standards. These guidelines are designed to safeguard sensitive data and prevent breaches, but are they truly effective? More importantly, are they worth the staggering costs and resources they demand?
In this post, we’ll delve into the uncomfortable truth that compliance does not equal security. We’ll explore the hidden costs of adherence to these frameworks, the limitations of regulatory approaches, and why even the most stringent compliance measures can’t always prevent a cyberattack. Prepare to be challenged as we navigate the complex landscape of cybersecurity risk management and consider what businesses should truly focus on to protect themselves. In today’s fast-paced, knowledge-driven economy, the concept of a subject matter expert (SME) holds significant weight. SMEs are seen as the pillars of their respective fields, offering insights, guiding best practices, and driving innovation. But what truly defines a subject matter expert? This blog post will delve into the criteria that distinguish a real SME, supported by insights from academic databases and high-ranking publications. The Paradox of Teamwork in Lands of Chiefs and Soloists: A Disruptive Twist to Hofstede’s Analysis7/21/2024 In a world where culture dictates the business game rules, Geert Hofstede’s theories on power distance and individualism invite us to rethink the enigma of teamwork. How is it that companies located in cultures where leaders are venerated and individual brilliance is rewarded continue to bet on collective work? Let’s break down this cultural oxymoron and explore how some organizations are boldly breaking molds.
It is well known that humans are the weakest link in the information security chain, but specifically, who are them? Well, you may guess, “they” are everyone. I have been in both sides, as a user and as a system admin; and in both sceneries humans tend to make mistakes. It’s human nature.
A lot have been investigated, written and said about how to better protect companies against the unstoppable proliferation of advanced and sophisticated cyber-threats/attacks. By default, and by common sense, we tend to think that by adopting and implementing cutting-edge security technologies, companies will be on a better position to stop, prevent, and reduce security threats from cyber-criminals. This is not so far from reality. Lots of technologies have emerged and being adopted to reach that goal. Among these technologies are: Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Firewalls, Antivirus, Network Access Control (NAC), Proxies, Gateways, Advance Threat Analytics (ATA), Sandboxes, Multi-factor Authentication (MFA), Artificial Intelligence (AI), and Machine Learning (ML) solutions to mention a few. However, security and data breaches still happen and are on the news all around the world, every day.
As of these days and since a long time ago, many businesses and enterprise know and take for granted that if they wish to be successful or competitive in their respective markets and industries, they should start using information technologies to achieve it. Nothing is farther from reality than this belief. It is a fact that any business or enterprise not using current technologies for its operational processes plans and marketing strategies will find it very difficult to achieve its goals and objectives of conducting business on a highly competitive and technological world as is todays; so a significant share of its yearly budget should be assigned to this item. |
AuthorDr. Gilberto Crespo is an information security researcher & technology expert. Archives
January 2025
Categories
All
|