Blockchain in E-Government

Published on PCWorld.al

This technology in the continues years has the potential and the purpose change of doing business in many fields of Information technology (IT) Web, Cloud, Big data etc.

 

 

 

 

 

 

 

 

Continue reading “Blockchain in E-Government”

Advertisements

Payment security: What are the biggest challenges?

With cybercrime on the increase, payment card security is increasingly a focus for companies and consumers alike. The Payment Card Industry Data Security Standard (PCI DSS) is there to help businesses that take card payments protect their payment systems from breaches and theft of cardholder data. The findings from the Verizon 2017 Payment Security Report (2017 PSR) demonstrate a link between organizations being compliant with the standard, and their ability to defend themselves against cyberattacks.

Source: helpnetsecurity

Continue reading “Payment security: What are the biggest challenges?”

Planning & managing projects

Published on PCWorld.al
working groups during study in Japan for PMP

The purpose of this article is to provide a clear overview of the project planning and management processes and to see enough the importance of applying guidelines and standards for successful project management. Here is also used some of the experience in project management in our Kosovo country to express a realistic situation of project failures cases and the organization’s impact on the project.

Continue reading “Planning & managing projects”

Is there a real need for e-services or EAs?

Published on PCWorld.al

In this analysis and special study for PCWorld and CiO Albanian are presented the solutions in providing the appropriate and efficient services at the right time for the citizens / businesses that need it, at the same time will share with you a part of my experience in residence in Tokyo Japan and visits and meetings I had about the topic of this article.  Continue reading “Is there a real need for e-services or EAs?”

Strategies for developing an Internet emergency response system

Published on PCWorld.al

Control the flow of information

All events occurring in the security field i.e. vulnerabilities, compromises, crashes, different attacks, or cause-of-action takes the basis and the starting point for the information flow. A process or cycle that defines the entire model, mode of operation and operation of different systems, services and infrastructures. Continue reading “Strategies for developing an Internet emergency response system”

Cybersecurity talk with Laura Gallante

Laura Galante speaks at TED2017 – The Future You, April 24-28, 2017, Vancouver, BC, Canada. Photo: Marla Aufmuth / TED

Attending and listening the experience and the stories from her work towards cyber security in particular, analysis and emphasis on the concepts of information security from an American perspective and the research of the developmental or evolution of based concept of 0 and 1 from Russia. 😀

Laura video speech How (and why) Russia hacked the US election | Laura Galante

Continue reading “Cybersecurity talk with Laura Gallante”

Blog at WordPress.com.

Up ↑