Connected

Connected

By
April 1, 2019

Smalltalk, it’s a Cleveland Thing   Yes, as a former Clevelander, I am playing with the word, Smalltalk. But did you know that one of the inventors of Smalltalk was from Cleveland, Ohio, and a woman? First, what is Smalltalk? Simply put, Smalltalk is a programming language that was created as a method for...
Read More »

Connected

By
January 2, 2019

Don’t Tell Anyone Shhh . . . don’t tell anyone, but I bought a pair of “smart glasses”! As the end of the year approached, I thought I would be able to get another pair of glasses, at my usual place; but my insurance changed, thus I needed to find a company who took...
Read More »

Connected

By
December 1, 2018

MTTD Four Years Today, in the cybersecurity community, we understand that it is not if you will be breached, but when you will be breached. When I heard that Starwood guest reservation database had been breached, I was not surprised. I was not surprised, not because we are accustomed to hearing about our personal...
Read More »

Connected

By
September 3, 2018

Event Driven Event driven programming is represented by the below flow chart: As I was looking at the flow chart above, I thought about how some people live event driven lives. What do I mean by this statement? There are people who live in a state of rest and become initialized only when an...
Read More »

Connected

By
August 5, 2018

Integrated Security Operation Center – ISOC You Cannot Fight What You Cannot See For those of you asked about last month’s podcast, I offer you this post to help answer your questions. One of the largest concerns in the United States, regarding cyber security, is how to secure the electrical grid. By consolidating all...
Read More »

Connected

By
July 26, 2018

You can listen to my Podcast this month, presented by IBM Security Intelligence Staff: Boost Energy and Utilities Security By Reducing SOC Complexity   https://securityintelligence.com/media/boost-energy-and-utilities-security-by-reducing-soc-complexity/</   Top Three Security Trends in the Energy Sector Scarcella has spent two decades with IBM handling concerns related to energy and utilities. In the podcast, she identifies three major...
Read More »

Connected

By
June 1, 2018

Supply Chain Management In July of 2017 new standards were put in place for NERC SIP – 013-1, which is about implementation guidance and SIP – 010-3, which is about software integrity and authenticity. (North American Electric Reliability Corporation, which is associated with FERC, the Federal Energy Regulatory Commission, which is a part of...
Read More »

Connected

By
May 1, 2018

DNA, Data, and Dollars I am adopted and thus I have often thought of doing a DNA test.  I really do not know much about my ethnicity, but every time the commercial is on television or the radio, this thought passes through my head; should I buy a DNA kit?  If so, which one...
Read More »

Connected

By
April 1, 2018

Data Integrity I have been interested in cyber security since the late nineteen nineties.  One of the first things that I learned about was the three tenets of information security, which are confidentiality, availability and integrity.  These three building blocks are at the core of every cyber security practice.  While there has been debate...
Read More »

Connected

By
March 1, 2018

Telemedicine     My thyroid was surgically removed, thus I need Synthroid. I have had the same prescription for years and yet I often procrastinate in going to my primary physician, to get the prescription for the blood work, and then make another appointment, to review the results, to receive the prescription for same...
Read More »



Art


Copy Protected by Chetan's WP-Copyprotect.