Fernando Monteleone

Photo of Fernando Monteleone

Latest Articles

Blockchain technology, introduced as the magic behind Bitcoin, is being touted by many as the next major disruptive innovation – in global trade and way beyond. At its core, Blockchain shifts the accounting function from third-party financial institutions and intermediaries to thousands of nodes (computers) on the Blockchain network that collectively maintain a public ledger of verifiable transactions.  Another important function of the Blockchain is that it validates the availability of funds or assets of…
Web Trackers have been a hot topic in recent news, yet most of us are oblivious not only the extent they are used, but also to the potential for misuse of our personal information currently being aggregated in countless databases around the world. On the day of this writing, I searched for “cordless drill” on the websites of three very familiar, top 20 global retailers and counted a total of 171 trackers. These trackers are…
Web Trackers have been a hot topic in recent news, yet most of us are oblivious not only the extent they are used, but also to the potential for misuse of our personal information currently being aggregated in countless databases around the world. On the day of this writing, I searched for “cordless drill” on the websites of three very familiar, top 20 global retailers and counted a total of 171 trackers.  These trackers are…
The heightened state of information security in recent years has instigated genuine collaboration, in many organizations, amongst its professionals in IT, records, security, risk, compliance, and other stakeholders in business management.  After the various perspectives are heard, the need is clear – an Information Governance (IG) strategy. What is IG?  Wikipedia roughly defines IG as a set of multi-disciplinary structures, policies, procedures, processes, and controls implemented to manage information at an enterprise level, supporting an…
These days information security is on the minds of virtually all technology professionals and business executives alike. But how does an organization ensure that its¬†security profile is adequate. It can certainly help to subscribe to a security framework. What is a security framework and which should I consider for my organization? A security framework can simply be described as a collection of policies, standards, procedures, controls, tools, and/or guidelines to assist in furthering an…
According to a very recent report by the Identity Theft Resource Center, the first half of 2015 alone saw 400 publicized security breaches with over 117 million records exposed. While most organization have ongoing initiatives to keep their names off the list, many are misguided in their approach – making the effort almost entirely an IT project. Numerous studies show a direct correlation between the maturity of an organization’s security profile and the level of…