What History Teaches Us About Being Connected
Let’s go back in history for a moment to when the Hawaiian Islands had not yet been discovered by Europeans. It was a time of rather great living in one respect. The natives of the Hawaiian Islands were physically isolated from the rest of the world and generally in...
The Next Black Swan Event: Are We Prepared for a Cyber-Physical Event?
The term "Black Swan" was popularized by Nassim Nicholas Taleb in his book "The Black Swan: The Impact of the Highly Improbable." It refers to events that are rare, have a significant impact, and are often unpredictable. In the book Taleb references the attacks on...
The Third Largest Economy
Browsing cybersecurity specific websites and feeds is indeed interesting. I keep up with all the latest and greatest trends by subscribing to various feeds and channels, as well as the aggregators found on some smartphone news applications. It makes it...
When It Rains It Floods
As I sit here in my California mountain home watching the snow come down outside, I am thankful that, at least for now, the rain has stopped. Anyone who has been following US news in the last several weeks is probably keenly aware that California has been...
Averting The Crisis
The global COVID 19 pandemic changed a lot of things in the world of networked technology. The popular online meeting platform Zoom saw an increase in meeting participants of 2900% during the pandemic. Other online meeting platforms as well as remote access...
Don’t Trust…But Verify
It took a while but the enterprise world seems to finally be catching on. We have been dealing with the issue of authorized access to networks since the beginning of the age of computer networks. We have tried all sorts of clever ideas yet we still run into...
CISA Establishing Some New Goals
In October 2022 the US Cybersecurity and Infrastructure Security Agency (CISA) released a document titled the CPG - Cross Sector Cybersecurity Performance Goals that lays out some guidelines… or perhaps suggestions… for improving the cybersecurity posture and...
The Problem Is Often From Within
Cybersecurity training and awareness for corporations should be a priority
De-Risk Your Digital Transformation Strategy
As industrial and large enterprise companies leverage technology to improve their businesses, they are investing billions of dollars into digital transformation (DX) initiatives that impact their factory operations, productivity, and...
Stating Your Security Postion
In the last year, the connected world has experienced nearly all the joys and pitfalls of our ever-increasing reliance on networked technologies, and security has finally taken center stage. Look no further than the Solarwinds, Colonial...