Connected

Connected

By
March 1, 2021

Securing the Internet of Things – IoT   A popular question for cybersecurity professionals is what keeps us up at night? In the past, I often have found this to be a scare tactic, but lately I have been very concerned about securing IoT.  Why? As we retrieve real time data and count on...
Read More »

Connected

By
February 14, 2021

Words not Numbers Elizebeth Smith Friedman, considered the first American female cryptanalyst, did not arrive at this job with a love for numbers, but rather a love for words. Who was Elizebeth Smith Friedman, and how can we learn from her techniques and make them applicable for us in technology today? Elizebeth was born...
Read More »

Connected

By
January 1, 2021

Hut Six   “We must not neglect the nonmilitary means by which an enemy may seek to undermine our national will.” ~ Gordon Welchman~   I am reading a very interesting book by Gordon Welchman called, The Hut Six Story: Breaking the Enigma Codes. Welchman was recruited to work at Bletchley Park, by Alastair...
Read More »

Connected

By
December 1, 2020

The Voting Ecosystem The United States voting system is not made up of just voting machines. What do I mean by this? Electronic systems, including the voting machines are tied into a much larger infrastructure, that includes operating systems and applications, that run on many different hardware components, that communicate to even a much...
Read More »

Connected

By
November 1, 2020

Industrial Revolution 5.0 The Industrial Revolution 5.0 has officially started, even though many of us in technology are still addressing cybersecurity challenges of the Industrial Revolution 4.0. Industrial Revolutions are marked by economist and historians as they record shifts in societies.  The first Industrial Revolution was identified by English economic historian, Arnold Toynbee.  https://tinyurl.com/y4glae8g   ...
Read More »

Connected

By
October 1, 2020

The Anatomy of a Cybersecurity Attack I have felt lately like we, in the cyber security community, are failing at our posts.  Our clients are suffering from real day to day cybersecurity threats, turning off their computers at night, to wake up to the same scenario that they just left. We keep saying if...
Read More »

Connected

By
September 1, 2020

Covid-19 and the Data There is a lot of misinformation about Covid-19.  I am fortunate to work with, what I consider, the best data modeling tool presently available. Interset, is the name of the technology, which is being used to help provide a predictive model for Covid-19. What is Interset?  How do I use...
Read More »

Connected

By
July 1, 2020

Defend Forward   The cybersecurity community has had a Defense in Depth strategy for well over a decade.  What does that mean? From a practical home application, Defense in Depth, would start with a fence around your property as an example, then a lock on all points of entry into the house, such as...
Read More »

Connected

By
May 1, 2020

Covid-19 and Changes to the Cybersecurity Landscape Covid-19 has changed the cybersecurity threat landscape. Often, the cybersecurity community looks to reduce the attack surface and provide less opportunity for bad actors. But Covid-19 has opened a very wide door and Advance Persistent Threats are on the rise, targeting businesses and individuals. Personally, I have...
Read More »

Connected

By
April 1, 2020

What Does the Data Tell Us?     We have a belief that more data equals better decisions. But many times the data that we receive is not accurate and complete, and we are only getting a partial view of what we really need to know, in order to make solid decisions. Recently, it...
Read More »



Art


Copy Protected by Chetan's WP-Copyprotect.