Hacking Evolution Over the past two decades, I’ve noticed an emerging trend in hacking: attacks are becoming more sinister given the fact attacks are increasingly personalized and especially covert. Back in 2002, blatant website defacements and hoax-like viruses were all the rage. But unlike the technical pranksters of yesterday who sought out notoriety, the hackers […]
Threat modeling is the art of assessing and anticipating threats in order to build a more tailored information security program. Essentially the process starts with enumerating threats, assessing probability and impact, then building your risk management or remediation plan. Once that threat has been “modeled,” it goes into a risk management state and the next […]
About Business Email Compromise Hackers are at the forefront of my mind these days. I’m not talking about the Hollywood portrayal of a stereotypical, hoody-sporting eccentric computer genius who spends countless hours hacking through “firewalls” and “antivirus” systems. No, I’m afraid reality is a bit more drab. The real hackers I come across likely sit […]
Offshore Appeal IT departments offshore specific functions for a wide range of reasons. Reducing costs, obtaining manpower “on-demand,” or simply tapping into a broader pool of skillsets are all legitimate needs which can be satisfied with a managed services provider that has a strong offshore labor capability. Yet graduating to an offshore model is similar […]
I often present enterprise application portfolio views to C-level executives. I convey color-coded views of company applications, grouped by function such as financials, CRM, communication and collaboration (CoCo) tools, and so on. Something a bit like the following: Discussions often emerge around reconciling figures between systems. For example, it’s not uncommon for the sales system to show slightly […]
Over the years I’ve spent a fair sum of money on IT products and services, and to be perfectly honest, I’ve always wanted to spend more. But poorly written IT contracts– whether new or inherited– have imposed limits on my buying power. Like a wet blanket sapping a once brightly-lit candle, unfavorable contract terms can […]
Background Given the security headlines of today, executives routinely ask me what they can do to shore up their defenses, and more often than not, how to commence new security programs. The logical starting point for many corporations seems to be commencing with some type of security assessment. Examples include security scans, penetration tests, social […]
“Defining success” sounds like a track that belongs at some second-rate professional networking event. You know the type: the smell of stale coffee wafting across a dimly-lit room where all you can make out are the the keynote speaker’s bleached-white teeth protruding from his motor-mouth that never stops spewing overly-obvious “advice” into the venue’s cheaply-made […]
In conversations with both executives and IT staff alike, there’s often confusion around how “true” infrastructure as a service solutions such as Amazon Web Services or OpenStack differ from a traditional hosting arrangements. By “traditional,” I’m referring to colocation facilities hosting one’s own (likely virtualized) servers, network and gear, and storage equipment. As such I […]
You may unsubscribe at any time by clicking the link in the footer of our emails. For information about our privacy practices, please visit our privacy notice. Note that we use Mailchimp as our email service provider. By clicking subscribe, you acknowledge that your information will be transferred to Mailchimp for processing.
About David Torre
David Torre is a business technology veteran with years of experience coupled with degrees in both information systems and business intelligence. This combination of skills has enabled David to provide enterprise solutions to well-known companies who face some of the toughest challenges in the business world today.
David currently resides in the San Francisco Bay Area where he runs Center Mast, LLC.