Claudius Link replied to secretGeek's status
@secretGeek Do you have a link to "the" video :-)?
According to my daughter I'm "in love with books".
I read a lot of Nonfiction books related to Cyber Security, Organizational Development, and Software Development in general. I'm interested in the human side of technology.
You can find me on infosec.exchange/@realn2s / @realn2s@infosec.exchange
This link opens in a pop-up window
@secretGeek Do you have a link to "the" video :-)?
Struggled at first. It is written in an unique style which took me some getting used too. Contains a lot of helpful insights which are directly useful for me (even or specially in #Cybersecurity)
#TIL I learned about the Zeigarnik Effect.
The brain keeps "background processes" running for uncompleted or interrupted tasks. Unsurprisingly these users cognitive resources which then aren't available for other tasks. Luckily a task can be "completed" by "delegating" it. E.g. writing it down.
Thai explains so much. Why #WIP is important, how #Kaban works, and generally why writing stuff down helps
@RenkeSiems@openbiblio.social Deutsch ist kein Problem :-)
@RenkeSiems@openbiblio.social I had stumbled on it some time ago. But forgot about it. Thanks for the recommendation. Now on my wishlist
The gripping, behind-the scenes story of one of the most sophisticated surveillance weapons ever created – and an existential threat …
Not a book driving into the technical details, but covering the organisation of the discovery and the stories behind the victims. It is a well written page turner leaving you frustrated about the suvielance industry, the misuse and the lacking regulation.
The gripping, behind-the scenes story of one of the most sophisticated surveillance weapons ever created – and an existential threat …
Rund 80 % der bekannten Angriffe lassen sich mit den Standard-Schutzmaßnahmen des IT-Grundschutzes abwehren.
— Informationssicherheit und Datenschutz systematisch und nachhaltig gestalten by Inge Hanschke (Page 4)
Leider wird dazu keine Quelle angegeben. Ich glaube es sind deutlich mehr als 80 %. Die Zahl hängt aber stark davon ab, wie ein "bekannter Angriff" definiert wird.
In Agile Information Security, James Fitzer provides sound guidance and examples on working agility into your information security process, using …
A new way of seeing the essential systems hidden inside our walls, under our streets, and all around us
Infrastructure …