Modern technology offers advantages that transcend humanity’s natural laws, a truth evident throughout history. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering

https://joealongi.dev/cybersecurity-ethics-and-the-security-of-information-in-a-global-posture/

Cybersecurity ethics and the security of information in a global posture

Modern technology offers advantages that transcend humanity’s natural laws, a truth evident throughout history. What sets this era apart is the unprecedented availability of data for analysis, sophisticated methods for ingesting it, and the capture of human experiences in bits and bytes. Ethics must adapt to modern theories that

Joe Alongi

I champion the thoughtful coders, those brewing custom solutions, assembling hardware, coding deliberately and impeccably. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering

https://joealongi.dev/a-decade-in-react-javascript-and-other-languages/

A decade in React, JavaScript, and other languages

As 2026 began, I was immersed in a project I’d launched earlier in the year, one full of promise, as they often are. Instead of watching the ball drop, I savored falling snow, a solid cup of coffee, and progress on a golf app for our office tournament. Scrolling

Joe Alongi

When evaluating the risk applied to a project, elevated by the interactions of CUI, for U.S. and DoW standards, the focus is to maintain the organizations business continuity. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering

https://joealongi.dev/business-process-plan-for-federal-technology-fedramp/

Business process plan for Federal Technology (FedRAMP)

In an ongoing contract with the federal government of the United States or Department of War (DoW), a business will need to stay compliant…

Joe Alongi

When this incident response is completed an audit of the impacted resources and recovered information will be provided in an inventory. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering

https://joealongi.dev/incident-response-plan-for-healthcare-technology-hitech/

Incident response plan for Healthcare Technology (HITECH)

In response to cyber-attacks against a healthcare organization, a primary objective of this plan is to protect data, reduce costs, limit…

Joe Alongi

When handling information in a secure system a layered approach provides unequivocal stages of security that require more involvement, the deeper the access goes. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering

https://joealongi.dev/common-risk-profile-for-healthcare-technology-hitech/

Common risk profile for Healthcare Technology (HITECH)

As a healthcare information technology system (HITS), storing protected healthcare information (PHI), from labs, hospitals, governments and…

Joe Alongi

As an interactive document to establish precedence for network security, disaster recovery (DR), and business continuity (BC), a network security plan stands as a handbook. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering

https://joealongi.dev/network-security-plan-for-financial-technology-fintech/

Network security plan for Financial Technology (FinTech)

As an interactive document to establish precedence for network security, disaster recovery (DR), and business continuity (BC), a network…

Joe Alongi

In the complex world of cybersecurity and the ever-evolving technology that it works to protect, there are continuously enumerating challenges in the daily threat posture. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering

https://joealongi.dev/vulnerability-management-program-for-financial-technology-fintech/

Vulnerability management program for Financial Technology (FinTech)

In the complex world of cybersecurity and the ever-evolving technology that it works to protect, there are continuously enumerating…

Joe Alongi

Through the process of reviewing the perceived risk of the data and infrastructure, risk assessment, mitigation plans, and monitoring tools will also be applied to the governance model. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering

https://joealongi.dev/architectural-risk-and-security-profile-for-financial-technology-fintech/

Architectural risk and security profile for Financial Technology (FinTech)

Establishing an enterprise ready internal process system for a Financial Technology service provider, within the banking and finance…

Joe Alongi

As applications, software, and data are an interconnected system that drive the interactions between businesses and information, the information needs to be kept in a secure and portable manner. #Applications #Cybersecurity #InformationSecurity #ChaosEngineering

https://joealongi.dev/engineering-data-lakehouse-infrastructure-for-financial-technology-fintech/

Engineering data lakehouse infrastructure for Financial Technology (FinTech)

In the design and planning of a data management system with flexible storage capabilities, it is important to reference modern…

Joe Alongi

As a horizontal, the cybersecurity landscape offers a variety of combinations when you look across the various endpoints that Microsoft supports.#Applications #Cybersecurity #InformationSecurity #ChaosEngineering

https://joealongi.dev/practical-introduction-to-security-compliance-and-identity-fundamentals/

Practical introduction to security, compliance, and identity fundamentals

Stepping into the world of Cybersecurity, and preparing for the Azure SC-900 certification

Joe Alongi