Career challenges. I recently got interviewed by @amazon and I also became a new mom: here is what happened. #womenintech
Today is World Password Day! The best way to celebrate is to upgrade your passwords. Let's face it, sometimes you keep your email or bank password for quite some time. With so many companies being vulnerable there is a great probability that your password is expossed in the black web, hence good cyber hygiene is … Continue reading Survey reveals that women do more to protect themselves online
Good design is Good businessTomas Watson Jr
Privacy by design is perfection, but engineers are the builders of that design
I feel so honored to collaborate with Computer World. Along with 10 other influencers of the Information Technology industry, we provide advice on how IT can improve the relationship with their End Users. My opinion is stated below: Technology Helping Technology Systems Engineer Martha Cisneros points out that data from help desk solutions can be brought to … Continue reading With help of reports, IT leaders could analyze end-user issues and needs, to be responsive and implement solutions – a collab with @ComputerWorld
The prefixes e‑ / virtual / cyber / digital / net are used to describe various ICT/Internet developments. Typically, they are used interchangeably. Each prefix describes the Internet phenomenon. Yet, we tend to use e‑ for commerce, cyber for crime and security, digital for development divides, and virtual for currencies, such as Bitcoin. Usage patterns … Continue reading Prefixes of the Net-Driven Economy e‑ / virtual / cyber / digital or net ?
During The World Summit on the Information Society (WSIS)1 came up with the following working definition of Internet governance: Internet governance is the development and application by governments, the private sector, and civil society, in their respective roles, of shared principles, norms, rules, decision‑making procedures, and programmes that shape the evolution and use of the … Continue reading What does #InternetGovernance mean?
Would you share the keys to your house to a complete stranger? Well, I thought I was never going to do it, but I did. Moreover, I am not talking literally about the keys to my real house, but rather to the essentials of my digital life, meaning the password of my email account. At … Continue reading Please, do not share your passwords over an open wireless network.
A key aspect to any war is to get to know your enemy. Hence, is important to know which ones are the most common kind of attacks that are out there. However, the below list of network attacks is a basic-kind-of network-attacks list, and since technology is always changing more attacks are created and evolving … Continue reading Do you know which types of network attacks are out there? #Privacy #CyberAware