PinnedE.J. HilbertinSystem WeaknessUC Data Breach- What Do I Do Now?Recommendations for those affected by the data breach·3 min read·Apr 7, 2021----
PinnedE.J. HilbertRussia’s “Sunburst Gambit — The Hack of SolarWinds, FireEye, et al.Cyber security is a game between the aggressor and the defender. Both players play both roles at times. The game board is the systems of…·4 min read·Dec 15, 2020----
E.J. HilbertWhat is a Cyber Security StrategyWhen I was in high school English class, many years ago, one of the worst assignments was “outlining an essay.” I remember having to turn…4 min read·Jul 11, 2022----
E.J. HilbertMitigation vs RemediationIn the world of risk there are only 4 ways to address identified risks. Accept them. Mitigate them. Remediate them. Heed them.·3 min read·Nov 24, 2020----
E.J. HilbertCOVID-19 Tracking App ConcernsLast week, the media reported that Apple and Google had joined forces to create a COVID Contact Tracking App (CCT app). Various…·6 min read·Apr 18, 2020----
E.J. HilbertEurope’s View on Cyber Security: “It’s not a concern!!”I wrote this in 2013 after moving to the U.K. to help push thru what we now call GDPR. GDPR was supposed to go into effect in March 2014…·11 min read·Apr 22, 2019----
E.J. HilbertRogue AgentI wrote and published this article in May 2016. Within 3 weeks of publishing, I was asked by my employer to remove it because it violated…·6 min read·Mar 6, 2019----
E.J. HilbertYesterday Someone Tried to Extort MeImagine my surprise when, while driving my daughter to lacrosse practice, I received a telegram message trying to extort me and the…·9 min read·Oct 15, 2018--1--1
E.J. HilbertToday, I Am A Hacker.I have breached your system; I have stolen your customer and employee data, your financial account information and your intellectual…4 min read·Feb 21, 2018----
E.J. HilbertInspected by Hacker #8This weekend while channel surfing I happened on an episode of a TV detective show. The main character is Sherlock Holmes type ex-cop with…2 min read·Feb 15, 2018----