Category: Connected

Tribute to Cristina Jill

  My dear friend Cristina Jill Mosqueda October 12th 2022 was a somber day, it was the day Kate called, to tell us that our beloved Jill had passed away. Adriana and I screamed no, no, no, as if by denying it we could bring her back. Kate had the courage to stay calm, even…

Connected

Securing the Internet of Things – IoT A popular question for cybersecurity professionals is what keeps us up at night?  In the past, I often have found this to be a scare tactic, but lately I have been very concerned about securing IoT.  Why?  As we retrieve real time data and count on this data…

Connected

Words not Numbers   Elizebeth Smith Friedman, considered the first American female cryptanalyst, did not arrive at this job with a love for numbers, but rather a love for words. Who was Elizebeth Smith Friedman, and how can we learn from her techniques and make them applicable for us in technology today? Elizebeth was born…

Connected

Hut Six “We must not neglect the nonmilitary means by which an enemy may seek to undermine our national will.” ~ Gordon Welchman~ I am reading a very interesting book by Gordon Welchman called, The Hut Six Story: Breaking the Enigma Codes. Welchman was recruited to work at Bletchley Park, by Alastair Denniston. Denniston was…

Connected

The Voting Ecosystem The United States voting system is not made up of just voting machines.  What do I mean by this?  Electronic systems, including the voting machines are tied into a much larger infrastructure, that includes operating systems and applications, that run on many different hardware components, that communicate to even a much larger…

Connected

Industrial Revolution 5.0 The Industrial Revolution 5.0 has officially started, even though many of us in technology are still addressing cybersecurity challenges of the Industrial Revolution 4.0. Industrial Revolutions are marked by economist and historians as they record shifts in societies.  The first Industrial Revolution was identified by English economic historian, Arnold Toynbee.  https://tinyurl.com/y4glae8g    The…

Connected

The Anatomy of a Cybersecurity Attack I have felt lately like we, in the cyber security community, are failing at our posts.  Our clients are suffering from real day to day cybersecurity threats, turning off their computers at night, to wake up to the same scenario that they just left. We keep saying if you…

Connected

Covid-19 and the Data There is a lot of misinformation about Covid-19.  I am fortunate to work with, what I consider, the best data modeling tool presently available.  Interset, is the name of the technology, which is being used to help provide a predictive model for Covid-19.  What is Interset?  How do I use it…

Connected

Defend Forward The cybersecurity community has had a Defense in Depth strategy for well over a decade.  What does that mean? From a practical home application, Defense in Depth, would start with a fence around your property as an example, then a lock on all points of entry into the house, such as doors and…

Connected

Covid-19 and Changes to the Cybersecurity Landscape Covid-19 has changed the cybersecurity threat landscape. Often, the cybersecurity community looks to reduce the attack surface and provide less opportunity for bad actors. But Covid-19 has opened a very wide door and Advance Persistent Threats are on the rise, targeting businesses and individuals. Personally, I have had…