Kate


Connected

October 8, 2018

Follow The Anatomy of an Attack Did you know that October is Cybersecurity Month? I would like to share an alarming statistic; Europol threat assessment reported that cybercrime is a three trillion dollar business. The dollar amount is higher than the drug trade which includes; heroin, marijuana and cocaine combined. I...
Read More »

Connected

September 3, 2018

Follow Event Driven Event driven programming is represented by the below flow chart: As I was looking at the flow chart above, I thought about how some people live event driven lives. What do I mean by this statement? There are people who live in a state of rest and become...
Read More »

Connected

August 5, 2018

Follow Integrated Security Operation Center – ISOC You Cannot Fight What You Cannot See For those of you asked about last month’s podcast, I offer you this post to help answer your questions. One of the largest concerns in the United States, regarding cyber security, is how to secure the electrical...
Read More »

Connected

July 26, 2018

Follow You can listen to my Podcast this month, presented by IBM Security Intelligence Staff: Boost Energy and Utilities Security By Reducing SOC Complexity   https://securityintelligence.com/media/boost-energy-and-utilities-security-by-reducing-soc-complexity/</   Top Three Security Trends in the Energy Sector Scarcella has spent two decades with IBM handling concerns related to energy and utilities. In the podcast,...
Read More »

Connected

June 1, 2018

Follow Supply Chain Management In July of 2017 new standards were put in place for NERC SIP – 013-1, which is about implementation guidance and SIP – 010-3, which is about software integrity and authenticity. (North American Electric Reliability Corporation, which is associated with FERC, the Federal Energy Regulatory Commission, which is a part...
Read More »

Connected

May 1, 2018

Follow DNA, Data, and Dollars I am adopted and thus I have often thought of doing a DNA test.  I really do not know much about my ethnicity, but every time the commercial is on television or the radio, this thought passes through my head; should I buy a DNA kit? ...
Read More »

Connected

April 1, 2018

Follow Data Integrity I have been interested in cyber security since the late nineteen nineties.  One of the first things that I learned about was the three tenets of information security, which are confidentiality, availability and integrity.  These three building blocks are at the core of every cyber security practice.  While...
Read More »

Connected

March 1, 2018

Follow Telemedicine     My thyroid was surgically removed, thus I need Synthroid. I have had the same prescription for years and yet I often procrastinate in going to my primary physician, to get the prescription for the blood work, and then make another appointment, to review the results, to receive the prescription for...
Read More »

Connected

February 1, 2018

Follow Securing Media and Entertainment We are all impacted by Media and Entertainment, whether as creators or consumers. Knowing how to secure data is critical for this industry, because among other things, “fake news” is actually real. It is important that we know where data originated and that what we are...
Read More »

Connected

December 1, 2017

Follow Writing Women in to History     I remember my 10th grade history teacher saying to all of us, go make herstory.  I have often thought about this comment throughout my life. I went to an all-girl, Catholic high school.  I think some people, in today’s politically charged environment, would think of herstory as a liberal...
Read More »



Art


Copy Protected by Chetan's WP-Copyprotect.