Leadership – Virtual Team meeting best practices

Uncategorized Comments Off on Leadership – Virtual Team meeting best practices

This May 2020 IIL blog article features a valuable article on how to improve our new paradigm of “virtual meetings” The Effective and Innovative Virtual Team Leader Here are a few suggestions that may assist in creating a virtual team community that is well connected, engaged, and productive: 1. Prepare an agenda for your meetings […]

Project Management – Agile improvement techniques May 2020

Uncategorized Comments Off on Project Management – Agile improvement techniques May 2020

This May 2020 IIL blog features a valuable article on how to improve Agile project management methodology (PMM) results. Agile & scrum techniques are leading modern PMM practices in the current business & technical environment for management large projects Capture More Agility by Tailoring Practices Put another way, if you believe in continuous improvement, then […]

Security – TOP 10 CVE attacks during 2016-2019

Uncategorized Comments Off on Security – TOP 10 CVE attacks during 2016-2019

Some of world’s most popular software products are ones being exploited most often (esp. where patching security flaws is not up-to-date). Some named technologies in the study include: Microsoft OLE, Apache Struts, Adode Flash, Internet Explorer 11, etc. https://www.us-cert.gov/ncas/alerts/aa20-133a https://www.us-cert.gov/sites/default/files/publications/AA20-133A_Top_10_Routinely_Exploited_Vulnerabilities_S508C.pdf Top 10 Most Exploited Vulnerabilities 2016–2019 — U.S. Government reporting has identified the top 10 […]

Security – Bluetooth 2 new vulnerabilities May 2020

Uncategorized Comments Off on Security – Bluetooth 2 new vulnerabilities May 2020

Bluetooth has issued guidance for 2 new vulnerabilities for low-powered usage where unauthorized interceptions could occur. Corporate ADMINs & users should be on the lookout as various vendors patch their products in the near future. https://kb.cert.org/vuls/id/534195/ Bluetooth Low Energy (BLE) and Basic Rate / Enhanced Data Rate (BR/EDR) Core Configurations are used for low-power short-range […]


© 2022 Computer Safety & News.
WordPress Theme & Icons by N.Design Studio. Provided by WPMU DEV -The WordPress Experts   Hosted by Microsoft MVPs
Entries RSS Comments RSS Log in