A Cloud’s Eye View Of Cyber VUCA In Age Of Rapid Change

As we wind down National Cybersecurity Awareness Month, I wanted to share some thoughts based on recent discussions with a few other cybersecurity professionals and some small business owners about the accelerated migration to the cloud. This article attempts to capture my observations, looking down over the landscape at a 10000-foot view. Security professionals are …

What Price Cybersecurity? – A Series of Essays Discussing the True Costs of Cybersecurity

As a Government Contracts consultant I frequently interact with clients concerning various requirements in their contracts. Often this means interpreting the requirement(s) and advising my client with respect to what they are contractually obligated to do so as to comply with various requirements. Often this leads me down rabbit holes – and as Lewis Carrol …

Collaboration in the Cloud – A Unified Theory

In the first article of this series, I posited that a meaningful strategy for accomplishing collaborative work in the cloud can only be achieved by thinking more holistically than has traditionally been the case. The reality is that work collaboration that drives competitive advantage is a multi-faceted endeavor. It requires the adoption of multiple best-of-breed …

The Disturbing Cyber Threat Targeting Medical Devices

Hackers have found another way to extort the medical community and their patients. There’s a disturbing trend of cyber-thieves targeting medical devices in doctors’ offices and hospitals. The very medical devices that provide life saving treatment are now being targeted by hackers – for profit. Just recently, researchers discovered a new version of MEDJACK, which is …

Understanding Cyber Risk- Cyber Security

All modern organizations face some degree of cyber risk. Cyber attacks over the last several years have been steadily increasing, and have increased in both count and severity very recently. New technology and its implementation has become a common task for business small and large. Only recently have small and mid-size businesses realized the importance of securing …

Cloud Computing Security

Cloud computing has quickly become a relevant technology within the information technology field over the past few years. This technology is powerful and useful but is a dual edge sword as security can become an issue quickly when placing data on web based storage servers. Information security is open broken up into C.I.A. (confidentiality, integrity, …

Voltron: Disrupting DoD Cybersecurity With Artificial Intelligence

There is no greater maxim than speed is decisive in war. However, cyber warfare today is a mostly manual process. Humans scour code to find vulnerabilities and fix problems with patches. Humans evaluate whether a patch will maintain overall system functionality, and whether a patch is performant. Human attackers exploit unpatched systems or vulnerabilities that, …