Beyond the Noise: Appreciating the Quiet Work of Effective Doers

In many cases, few, if any, are aware of the work that they do and how important it is.
We as an industry are long overdue in appreciating those who talk little but deliver big for us time and time again.
Getting things done requires more than talk - it requires action, discipline, know-how, hard work, consensus building, and a constant focus on the goal.
When working towards a desired end, there isn't a lot of time to shout from the hilltops.
Perhaps that is why the people who spend a lot of time talking about what they are doing aren't the ones we look to when a job needs to get done.
Being On Time: Regarding being on time, one of my friends once shared with me that if you tell someone to be out front in 15 minutes to receive a suitcase with a million dollars, they would be there on time.
In other words, being on time is about prioritizing what is important to us.
If our work meetings, deadlines, and other obligations are important to us, we will be on time.
Of course, there are extenuating circumstances that arise from time to time, but not as often as people claim they do.
Whether it is showing up for a meeting, delivering ahead of a deadline, or anything else, the people we look to get things done on time.
Some people are constantly throwing out new ideas, new directions, and new fads.
More often than not what is thrown out is simply a shiny object that pulls us off track.
As much of a challenge as staying focused is, getting things done requires it.
Underpromise and Overdeliver: I've always been fascinated by people who pontificate their grandiose plans, only to fail to deliver on them again and again.
It is a tragic cycle, and generally, after two or three instances of it, people within the organization get wise to it.
Perhaps it is because the overpromisers aren't aware enough to realize that people have gotten wise to them.
These are the people we look to when we want to make sure something will get done right.
We all know who we can count on, whether in our personal lives or our professional lives.
More often than not, we are grateful for and celebrate the wrong people.
It is incumbent on all of us to take the time to appreciate and acknowledge the doers in our lives.


This Cyber News was published on www.securityweek.com. Publication date: Thu, 14 Dec 2023 12:43:04 +0000


Cyber News related to Beyond the Noise: Appreciating the Quiet Work of Effective Doers

Beyond the Noise: Appreciating the Quiet Work of Effective Doers - In many cases, few, if any, are aware of the work that they do and how important it is. We as an industry are long overdue in appreciating those who talk little but deliver big for us time and time again. Getting things done requires more than talk - ...
11 months ago Securityweek.com
CVE-2024-26626 - In the Linux kernel, the following vulnerability has been resolved: ...
8 months ago
Cybersecurity in the Age of Remote Work - The shift towards remote work has brought numerous benefits, but it has also exposed organizations to new cybersecurity risks. We will uncover key insights and best practices to ensure the safety of operations in the age of remote work. In ...
8 months ago Securityzap.com
Securing Remote Work: A Guide for Businesses - This article aims to provide businesses with a comprehensive guide to securing remote work, covering the essential components of remote work security policies and exploring best practices for ensuring secure communication. By implementing these ...
9 months ago Securityzap.com
Cybersecurity for Remote Work: Securing Virtual Environments and Endpoints - Remote work surged in popularity out of necessity during the COVID-19 pandemic but seems to be here to stay, thanks to its unique advantages. With the rise in remote work also comes an increase in cybersecurity challenges spurned by the circumstances ...
10 months ago Cybersecurity-insiders.com
What is Security Service Edge? - The contemporary work landscape is swiftly transitioning into a hybrid model, encompassing remote and office-based work for employees. This transformation introduces novel challenges in ensuring security across many work locations with diverse ...
10 months ago Cybersecuritynews.com
Do AirPods Work With Android? - AirPods work well with Android, but the experience may be less satisfying or convenient compared to Apple's ecosystem. Certain features are unavailable such as customizing double-tap functionality and access to Siri voice assistant. One of the best ...
11 months ago Hackercombat.com
How to turn shadow IT into a culture of grassroots innovation - Total, centralized IT control is no longer practical now that hybrid work and BYOD are here to stay. When users look for new ways to get work done, the solutions they find can be the seeds of innovation and the key to unleashing productivity and ...
10 months ago Helpnetsecurity.com
One Day in the Life of EFF's Activism Team - EFF's activism team includes experienced issue experts, master communicators, and grassroots organizers who help to coordinate and orchestrate EFF's activist campaigns that include but go well beyond litigation, technical analyses and solutions, and ...
6 months ago Eff.org
IT and security professionals demand more workplace flexibility - The concept of Everywhere Work is now much broader, encompassing where, when, and how professionals get their work done - and flexibility has become a key workplace priority, according to Ivanti. Ivanti surveyed over 7,700 executive leaders, IT and ...
7 months ago Helpnetsecurity.com
CVE-2024-53054 - In the Linux kernel, the following vulnerability has been resolved: cgroup/bpf: use a dedicated workqueue for cgroup bpf destruction A hung_task problem shown below was found: INFO: task kworker/0:0:8 blocked for more than 327 seconds. "echo 0 > ...
1 day ago Tenable.com
Infrastructure vs. Runtime — Where Are Your Priorities? - Amid the noise of new solutions and buzzwords, understanding the balance between securing infrastructure and implementing runtime security is key to crafting an effective cloud strategy. An effective runtime solution allows two opposing teams to work ...
1 month ago Darkreading.com
Cyber scam call center slavery expands beyond southeast Asia The Register - Human trafficking for the purposes of populating cyber scam call centers is expanding beyond southeast Asia, where the crime was previously isolated. Interpol revealed this week that an ongoing investigation has discovered evidence of abuse emanating ...
11 months ago Go.theregister.com
5 common data security pitfalls - Many organizations are caught in the crosshairs of cybersecurity challenges, often due to common oversights and misconceptions about data security. From the pitfalls of decentralized data security strategies to the challenges of neglecting known ...
11 months ago Securityintelligence.com
CVE-2023-46217 - Multiple vulnerabilities exist in Ivanti Avalanche v6.4.1 WLAvalancheService.exe.CVE-2023-41727 - MuProperty type 100 stack-based buffer overflow (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)A message sent to WLAvalancheService.exe on TCP port 1777 ...
11 months ago Tenable.com
CVE-2023-46216 - Multiple vulnerabilities exist in Ivanti Avalanche v6.4.1 WLAvalancheService.exe.CVE-2023-41727 - MuProperty type 100 stack-based buffer overflow (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)A message sent to WLAvalancheService.exe on TCP port 1777 ...
11 months ago Tenable.com
CVE-2023-41727 - Multiple vulnerabilities exist in Ivanti Avalanche v6.4.1 WLAvalancheService.exe.CVE-2023-41727 - MuProperty type 100 stack-based buffer overflow (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)A message sent to WLAvalancheService.exe on TCP port 1777 ...
11 months ago Tenable.com
CVE-2024-35852 - In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work The rehash delayed work is rescheduled with a delay if the number of credits at end of the work is not negative ...
6 months ago Tenable.com
The Role of the CISO in Digital Transformation - Modern-day demands require organizations to be flexible and digitally savvy, getting work done remotely and in the public cloud as often as in a centralized physical location, if not more so. As companies continue to modernize their workflows and ...
11 months ago Darkreading.com
CVE-2022-24759 - `@chainsafe/libp2p-noise` contains TypeScript implementation of noise protocol, an encryption protocol used in libp2p. `@chainsafe/libp2p-noise` before 4.1.2 and 5.0.3 does not correctly validate signatures during the handshake process. This may ...
2 years ago
VoltSchemer attacks use wireless chargers to inject voice commands, fry phones - A team of academic researchers show that a new set of attacks called 'VoltSchemer' can inject voice commands to manipulate a smartphone's voice assistant through the magnetic field emitted by an off-the-shelf wireless charger. VoltSchemer can also be ...
9 months ago Bleepingcomputer.com
Navigating the Internship Odyssey: Taking a Leap To Love Where I Work - When I started interviewing for Cisco, I was overwhelmed. I didn't believe I was the number one candidate for a project management internship, as I was a telecommunications bachelor graduate and was studying computer science. Well, I have seen ...
8 months ago Feedpress.me
CVE-2024-46704 - In the Linux kernel, the following vulnerability has been resolved: workqueue: Fix spruious data race in __flush_work() When flushing a work item for cancellation, __flush_work() knows that it exclusively owns the work item through its PENDING bit. ...
2 months ago Tenable.com
7 Months Inside an Online Scam Labor Camp - He had been kidnapped and forced to work for an abusive online scam operation. A man was abducted by a Chinese gang and forced to work in a scam operation. More than anything else, Neo Lu, a 28-year-old Chinese office worker, believed the gig would ...
11 months ago Nytimes.com
CVE-2023-52587 - In the Linux kernel, the following vulnerability has been resolved: ...
8 months ago

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)