
Cybersecurity ethics and the security of information in a global posture
Modern technology offers advantages that transcend humanity’s natural laws, a truth evident throughout history. What sets this era apart is the unprecedented availability of data for analysis, sophisticated methods for ingesting it, and the capture of human experiences in bits and bytes. Ethics must adapt to modern theories that
Joe Alongi
A decade in React, JavaScript, and other languages
As 2026 began, I was immersed in a project I’d launched earlier in the year, one full of promise, as they often are. Instead of watching the ball drop, I savored falling snow, a solid cup of coffee, and progress on a golf app for our office tournament.
Scrolling
Joe AlongiWhen evaluating the risk applied to a project, elevated by the interactions of CUI, for U.S. and DoW standards, the focus is to maintain the organizations business continuity. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering
https://joealongi.dev/business-process-plan-for-federal-technology-fedramp/

Business process plan for Federal Technology (FedRAMP)
In an ongoing contract with the federal government of the United States or Department of War (DoW), a business will need to stay compliant…
Joe Alongi
Incident response plan for Healthcare Technology (HITECH)
In response to cyber-attacks against a healthcare organization, a primary objective of this plan is to protect data, reduce costs, limit…
Joe AlongiWhen handling information in a secure system a layered approach provides unequivocal stages of security that require more involvement, the deeper the access goes. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering
https://joealongi.dev/common-risk-profile-for-healthcare-technology-hitech/

Common risk profile for Healthcare Technology (HITECH)
As a healthcare information technology system (HITS), storing protected healthcare information (PHI), from labs, hospitals, governments and…
Joe AlongiAs an interactive document to establish precedence for network security, disaster recovery (DR), and business continuity (BC), a network security plan stands as a handbook. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering
https://joealongi.dev/network-security-plan-for-financial-technology-fintech/

Network security plan for Financial Technology (FinTech)
As an interactive document to establish precedence for network security, disaster recovery (DR), and business continuity (BC), a network…
Joe AlongiIn the complex world of cybersecurity and the ever-evolving technology that it works to protect, there are continuously enumerating challenges in the daily threat posture. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering
https://joealongi.dev/vulnerability-management-program-for-financial-technology-fintech/

Vulnerability management program for Financial Technology (FinTech)
In the complex world of cybersecurity and the ever-evolving technology that it works to protect, there are continuously enumerating…
Joe AlongiThrough the process of reviewing the perceived risk of the data and infrastructure, risk assessment, mitigation plans, and monitoring tools will also be applied to the governance model. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering
https://joealongi.dev/architectural-risk-and-security-profile-for-financial-technology-fintech/

Architectural risk and security profile for Financial Technology (FinTech)
Establishing an enterprise ready internal process system for a Financial Technology service provider, within the banking and finance…
Joe AlongiAs applications, software, and data are an interconnected system that drive the interactions between businesses and information, the information needs to be kept in a secure and portable manner. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering
https://joealongi.dev/engineering-data-lakehouse-infrastructure-for-financial-technology-fintech/

Engineering data lakehouse infrastructure for Financial Technology (FinTech)
In the design and planning of a data management system with flexible storage capabilities, it is important to reference modern…
Joe AlongiAs a horizontal, the cybersecurity landscape offers a variety of combinations when you look across the various endpoints that Microsoft supports.#Applications #Cybersecurity #InformationSecurity #ChaosEngineering
https://joealongi.dev/practical-introduction-to-security-compliance-and-identity-fundamentals/

Practical introduction to security, compliance, and identity fundamentals
Stepping into the world of Cybersecurity, and preparing for the Azure SC-900 certification
Joe Alongi