Monthly Archives: December 2016

Missed the conference? Learn how to pay down your #cybersecurity debt @PrivacyProf, @AntonioIerano & @MagdaChelly http://video.dataprivacyasia.com

Missed the conference? Learn how to pay down your #cybersecurity debt @PrivacyProf, @AntonioIerano & @MagdaChelly https://t.co/h1920sHGPF pic.twitter.com/SqRdtrOjRR— Data Privacy Asia (@dataprivacyasia) December 15, 2016

Solution selling: are you sure you know what really means?

I hear a lot of people talking a lot about “solutions selling”, all keep telling us they are moving to that area, but do we really understand what “solution selling” means? Solution selling does not mean we have to sell “a solution” in terms of a complicated architecture or a set of interconnected boxes or whatsoever. Solution selling is a sales methodology. Rather than just promoting an existing product, the salesperson focuses on the customer’s pain(s) and addresses the issue with his or her offerings (product and services). The resolution of the pain is what is a “solution”. What does…

Firewall: Traditional, UTM and NGFW. Understanding the difference

Firewall: Traditional, UTM and NGFW. Understanding the difference One of the problem nowadays when we talk about firewalls is to understand what actually a firewall is and what means the acronym that are used to define the different type of firewalls. The common definition today recognizes 3 main types of firewalls: • Firewalls • UTM • NGFW But what are the differences (if any) between those things? Let’s start with the very basic: what a firewall is. Firewall: A firewall is software used to maintain the security of a private network. Firewalls block unauthorized access to or from private networks…

Caro HR Manager: Storia di un CV e della sua privacy (GDPR lo dici a tua sorella)

Caro HR Manager: Storia di un CV e della sua privacy (GDPR lo dici a tua sorella) Sono un poco preoccupato, perché la mia impressione è che in Italia, a fronte di una delle legislazioni più severe d’Europa e i nuovi vincoli introdotti od in via di introduzione dal GDPR, il concetto di privacy sia altamente sottovalutato. Il problema ovviamente è insito nella storica sottovalutazione italica dell’impatto delle strutture informatiche all’interno dei processi produttivi, decisionali e manageriali. Insomma non ci si interessa, non si capisce, e non si valuta. Di conseguenza non si correggono comportamenti errati e, allo stesso tempo,…

Pretty Good Privacy (PGP)

Pretty Good Privacy (PGP) Pretty Good Privacy or PGP is a popular program used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and encrypted stored files. Previously available as freeware and now only available as a low-cost commercial version, PGP was once the most widely used privacy-ensuring program by individuals and is also used by many corporations. It was developed by Philip R. Zimmermann in 1991 and has become a de facto standard for email security. How PGP works Pretty Good Privacy uses a variation of the public key system. In this…

Dataprivacyasia: Antonio Ieranò at Asia’s premier data protection, privacy and cybersecurity conference. Watch videos

Missed @AntonioIerano at Asia‘s premier #dataprotection, #privacy and #cybersecurity conference? Watch videos — Data Privacy Asia (@dataprivacyasia) December 10, 2016 from http://twitter.com/dataprivacyasia Missed @AntonioIerano at Asia's premier #dataprotection, #privacy and #cybersecurity conference? Watch videos at https://t.co/h1920sHGPF pic.twitter.com/MiCcqkFpOy — Data Privacy Asia (@dataprivacyasia) December 10, 2016   Related articles How Businesses Are Preparing for the GDPR (cmswire.com) Related posts: Captain Crunch needs your help Berlusconi ed il popolo dei brainless FW SPAM: hello, i see your profile at (linkedin.com) World Dictionary New Words and Meaning: Communist Ahmed Mohamed the kid arrested because too smart Powered by YARPP.

Maslow hierarchy of needs applied to employee engagement

Maslow hierarchy of needs can be applied to employee engagement; it is an interesting exercise since help us to understand why we should implement correction in our management style in order to retain talents and best performers inside the company. The 5 level of Maslow can be somehow translated into the engagement level of the employee as showed in the image. So let try to understand the 5 levels. This five stage model can be divided into deficiency needs and growth needs. The first four levels are often referred to as deficiency needs and the top level is known as…

Micromanagement vs. experts: the original sin in organizations

I was reading an interesting article about micromanagement (Why Is Micromanagement So Infectious?) that forced me to write again on management issue. My interest is on the implication of a micromanagement attitude on a team with a focus on expert management. In business management, micromanagement is a management style whereby a manager closely observes or controls the work of subordinates or employees. Micromanagement generally has a negative connotation. Micromanagement classic symptoms are the lack of delegation, the imposition of company rules regardless their effectiveness or fairness, the not contextualization of task and goals, the trivial focus on the lesser details…

Industry 4.0. a cultural revolution before a technology one

Industry 4.0. a cultural revolution before a technology one by Antonio Ieranò We are used to deal with linguistic expressions consisting of a name and two wagered numbers whose second is a zero: Type 2.0, 3.0, 4.0 and so on. Referenced in ascending order, the figures would suggest an evolution, a transition to a more advanced version (or up to date one) of a given situation or a certain object. Among the first to show itself, and the best known not only among the experts there is definitely “web 2.0”. It is a fascinating phenomenon from an ideal point of…

Posts navigation