A collection of articles, research, and studies on Information and Communication Technology and Cybersecurity for various industries.
This article explores the critical role of Artificial Intelligence (AI) can play in bridging the gap between Business strategies and IT capabilities within organizations. It highlights the historical challenges of aligning Business goals with IT strategies, emphasizing the evolving role...Read More
A minimal checklist for hardening (securely configuring) and optimization of a WordPress website is provided below. Hardening (secure configuration): Always keep the operating system of the server where the WordPress website is hosted up to date.Install and configure an application...Read More
This article discusses the role of Business in Cybersecurity and how they can assess the security level of IT/OT systems they own. Because the Business must participate in the overall cybersecurity program of the organization, it should not delegate overall responsibility...Read More
Security vulnerabilities can provide valuable knowledge for business, technical and operational decision-making and Vulnerability Intelligence is the practice to determine such information and knowledge. Computer system security vulnerabilities  are dangerous and must be addressed because they can be exploited...Read More
Classification and identification of software security vulnerabilities is not often easy and to facilitate it here I present a reference model, databases, metrics, and relationship between CVE, CVSS, CWE, CWSS, OWASP, and SANS standards. Many organizations and communities create and maintain...Read More