PinnedPublished inSystem WeaknessUC Data Breach- What Do I Do Now?Recommendations for those affected by the data breachApr 7, 2021Apr 7, 2021
PinnedRussia’s “Sunburst Gambit — The Hack of SolarWinds, FireEye, et al.Cyber security is a game between the aggressor and the defender. Both players play both roles at times. The game board is the systems of…Dec 15, 2020Dec 15, 2020
What is a Cyber Security StrategyWhen I was in high school English class, many years ago, one of the worst assignments was “outlining an essay.” I remember having to turn…Jul 11, 2022Jul 11, 2022
Mitigation vs RemediationIn the world of risk there are only 4 ways to address identified risks. Accept them. Mitigate them. Remediate them. Heed them.Nov 24, 2020Nov 24, 2020
COVID-19 Tracking App ConcernsLast week, the media reported that Apple and Google had joined forces to create a COVID Contact Tracking App (CCT app). Various…Apr 18, 2020Apr 18, 2020
Europe’s View on Cyber Security: “It’s not a concern!!”I wrote this in 2013 after moving to the U.K. to help push thru what we now call GDPR. GDPR was supposed to go into effect in March 2014…Apr 22, 2019Apr 22, 2019
Rogue AgentI wrote and published this article in May 2016. Within 3 weeks of publishing, I was asked by my employer to remove it because it violated…Mar 6, 2019Mar 6, 2019
Yesterday Someone Tried to Extort MeImagine my surprise when, while driving my daughter to lacrosse practice, I received a telegram message trying to extort me and the…Oct 15, 20181Oct 15, 20181
Today, I Am A Hacker.I have breached your system; I have stolen your customer and employee data, your financial account information and your intellectual…Feb 21, 2018Feb 21, 2018
Inspected by Hacker #8This weekend while channel surfing I happened on an episode of a TV detective show. The main character is Sherlock Holmes type ex-cop with…Feb 15, 2018Feb 15, 2018