Connected

Connected

By
January 1, 2015

New Year’s Digital Resolution The Cybersecurity Checkup©   Have you made a list of your New Year’s Resolution?  Are you planning on joining a gym, paying off a debt, changing jobs, or perhaps taking that long dreamed of trip?  Have you determined to make sure you get that annual physical, the oil changed in...
Read More »

Connected

By
December 18, 2014

Sony Defeated in Cyberwar If there has ever been a question in your mind if there is a cyberwar, it should have been answered after the Sony attack.  Sony has now agreed to the demands of the cybercriminals, who by the way have been linked to North Korea.  Nation State sponsored cyber attacks, which...
Read More »

Connected

By
December 8, 2014

The Risk Based Strategy The Internet of Things, IoT, which “is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure,” includes everything from our computers and cellphones, to pacemakers and insulin pumps, to smart meters and toll passes. It is noted by Gartner, an American information technology research group that...
Read More »

Connected

By
October 16, 2014

Shellshock! Welcome to Cybersecurity Awareness month!  As a person who knows of many cyber-attacks that are not reported, I can say that I would not have imagined what I have seen.  While I am concerned by the credit card numbers, and customer information that has been accessed by hackers, I am more concerned by...
Read More »

Connected

By
July 6, 2014

Google Ink My father was a plastic surgeon, who on the occasional Sunday evening, brought his work home.  We would gather around the living room, popcorn in tow, and watch a slide show of his latest and most interesting cases.  There are two instances, which I remember to this very day: The first involved...
Read More »

Connected

By
December 15, 2013

    Digital Attack Map   Is all of the hype true?  Are we really under a cyber-attack?  Do we truly need to fear a digital attack?  Yes!  I recently ran across the digital attack map, which I think helps to demonstrate the very real threat, which we all live under. ...
Read More »

Connected

By
October 25, 2013
Connected

  Truly Connected   I thank all of you for your prayers, over the past few days; I have needed them.  This past week, while trimming an oak branch, I feel around twenty feet, slamming my right foot into a rock.  I had cut the branch, with a chain saw, when the branch suddenly...
Read More »

Connected

By
July 3, 2013

   Hacked or Spoofed Recently I received an email from Jill, where the “From” address had her name, but when I opened the email, I knew it was not from her. Initially, I became concerned; I would hate for Jill’s email to get hacked, especially since I am in the security world.  I followed...
Read More »

Connected

By
April 9, 2013

  The X-Force Emerging Threats IBM has a security research and development team called the X-Force. The IBM X-Force team is world renowned for studying and monitoring the latest vulnerabilities and threats on the web. They are also responsible for discovering vulnerabilities that exist within our own products, as well as third party products,...
Read More »

Connected

By
January 2, 2013

I Remember I woke up today thinking how strange it is not to have Stella, in my life.  I miss her, and the idea that I will never see nor hear her again, saddens me deeply. One of the last moments, which I had with Stella, is a memory that I continue to replay...
Read More »



Art


Copy Protected by Chetan's WP-Copyprotect.