As I sent my son back to school last month, I quickly realized the carefree days of summer were behind us. It means battles over stricter bedtime, doing homework and more screen-time limits. It..
I used to define negotiation as that arduous battle of wills between two parties that was best illustrated by my least favorite activity in the world…buying a car. That was until I became a..
Last weekend I played “The Game of Life” with my son and I realized how early we expose our kids to the concept of risk. As he approached the choice to take “The Safe Path of Life” or “The Risky..
I recently took my six-year old to see Beauty and the Beast. After the movie, he began asking questions like “Why did the Beast throw the rose on the ground?” or “Why did the Enchantress turn the..
Since its debut, development and operations, otherwise known as “DevOps”, has gained momentum in various industry sectors as a mainstream strategy.
A Well-Oiled Machine No More
For the last twenty years or so, the Commercial Mortgage Backed Securities (CMBS) market has pretty much functioned as a well-oiled machine.
As antivirus vendors and cybersecurity professionals make headway against global malware and cyberattacks, hackers have evolved and become more advanced in order to profit from their exploits.
Most organizations have a Business Continuity Plan (BCP) in place to address planned procedures in the wake of man-made or natural disasters. But having a documented plan is only a piece of the..
Commercial Real Estate is once again in the crosshairs of bank regulators who are trying to ensure that a bubble scenario does not develop in this very hot market.
The appeal of cloud computing is undeniable. The cloud has eliminated traditional IT barriers to market entry, inspired innovative business models, and improved business efficiency.
As organizations attempt to stay ahead of cyber threats, Social Engineering tops the list of the most popular hacking methods. Social Engineering is the use of human interaction to obtain..