Skip to content
AI-Enhanced Business-IT Alignment

AI-Enhanced Business-IT Alignment

This article explores the critical role of Artificial Intelligence (AI) can play in bridging the gap between Business strategies and IT capabilities within organizations. It highlights the historical challenges of aligning Business goals with IT strategies, emphasizing the evolving role of IT from a supportive function to a strategic partner. The article discusses the negative effects of misalignment and underscores the importance of Business-IT Alignment for organizational competitiveness and effectiveness. Central to the discussion is how AI emerges as a…

Read more
WordPress Hardening And Optimization

WordPress Hardening & Optimization Checklist

A minimal checklist for hardening (securely configuring) and optimization of a WordPress website is provided below. Hardening (secure configuration): Always keep the operating system of the server where the WordPress website is hosted up to date.Install and configure an application firewall (Wordfence plugin can be used).Install an SSL certificate, deactivate HTTP, and redirect all traffic to HTTPS.Change the URI of /wp-admin/ to something less obvious (WPS Hide Login plugin can simplify the job).Add a 404 page not found and redirect…

Read more

Identification Of Software Security Vulnerabilities

Classification and identification of software security vulnerabilities is not often easy and to facilitate it here I present a reference model, databases, metrics, and relationship between CVE, CVSS, CWE, CWSS, OWASP, and SANS standards. Many organizations and communities create and maintain a wide range of standards, databases, metrics, and classifications in order to identify, describe, publicize, and assess the severity of software vulnerabilities. Because of this plethora of entities and information, it is frequently difficult to understand the distinctions and relationships…

Read more
Search