Technology had made it easier using an eBook Viewer to take with you any or all of your favorite books with you. EPT Books / Viewer page is the jumping off point.
Engineered Products Technology Publications are compilations of experiences over a 40 year technology career. In my career I’ve been blessed to work with small to massively large companies. Every company was dependent on technology to thrive and looking for ways to be more efficient.
My job as an SME (Subject Mater Expert), my tasks were to work with customers implementing technology to solve problems. It was during discovery when we uncovered a myriad of shortcomings in existing and new implementations.
It was at this point we went to work plugging holes in the targeted systems and work outwards through the technology stack. In the end, the customer had a technology stack that was sustainable over the long haul. Changes made included upgrades, complete replacement, or retrofitting existing pillars.
Making things Easy:
Our books show ways forward taken by companies so shore up their environment and all affected pillars. Technology has changed rapidly as it has the way it’s been implemented. Our intent is to present a roadmap for deploying systems based on success stories. Most of these systems are in production today and have survived radical increases in estimated utilization. Businesses threw hardware at problems until that became untenable and were forced to re-engineer.
There is no silver bullet to addressing the future but we make decisions easier based on experiences faced and solutions provided by other companies. Reinventing the wheel is not an option, but greasing it along the way is more valuable.
The Engineered Products Technology Publications category was created specifically to promote books written by the Engineered Products & Technology L.L.C. technology side of the business. The EPT Books / Viewer are an efficient way to read while on the go. Click and view the table of contents for our publications, you won’t be disappointed…
Secured By Design Podcasts have been tailored for each pillar in the technology stack. As you can imagine each pillar has its own requirements and skill set required. Attacks against technology stacks morph as fast as you can close holes leaving no time to rest on your laurels.
One should assume breaking into systems and stealing personal data will continue. In fact, some view it as a sport. What is clear is the destructive nature of these attacks has the potential to bring businesses to their knees. As an example, hospitals and schools have been compromised and required to pay what accounts for ransom. Only after paying huge sums of money have these organizations been given back their systems.
The major problem is hackers can plant “trojan horses” where the system can be taken over again and ransom requested even after payment has been received. Everyone business faces these threats whether their systems are publicly facing or not. Security teams see everyone as a threat and are looking for ways systems can be exploited. In the internet age, companies need to be online 24/7 but make requests for downtime a tad bit more difficult. But it is during these maintenance periods security vulnerabilities must be addressed. A robust patching strategy thorough tested against the equivalent production system can be a tough sell. Nevertheless, all systems must follow the same rules as production to achieve the optimum protection.
Secured By Design Podcasts are here to assist in prevention and the hope is they convey the level of exposure each pillar presents.