
Information Security
51 posts



DO NOT trust cryptography software that isn't open source. Even open source software must be validated by 3rd party and cryptography gurus. Police decrypt 258,000 messages after breaking pricey IronChat crypto app. arstechnica.com/information-te…





modulation of constraints is kind of a big thing when managing with teams



Service Governance & Collaborative Consulting; ideal companions. #Governance #Consulting #Consultant #servicemanager




Another great read from @DuenaBlomstrom "What some people fail to realize about Agile is that doing it "by numbers" is doomed #agile #transformation #mindset #leadership #change #disruption #digital #collaboration #psychologicalsafety #3af38aca4d1f" target="_blank" rel="nofollow noopener">forbes.com/sites/duenablo…






@theitskeptic I think the cornerstones of such approaches can only be described in a set of principles, such as the one in this paper: slideshare.net/npflaeging/sec…





