My dear friend Cristina Jill Mosqueda October 12th 2022 was a somber day, it was the day Kate called, to tell us that our beloved Jill had passed away. Adriana and I screamed no, no, no, as if by denying it we could bring her back. Kate had the courage to stay calm, even…
Category: Connected
Connected
by
•Connected
by
•Words not Numbers Elizebeth Smith Friedman, considered the first American female cryptanalyst, did not arrive at this job with a love for numbers, but rather a love for words. Who was Elizebeth Smith Friedman, and how can we learn from her techniques and make them applicable for us in technology today? Elizebeth was born…
Connected
by
•Hut Six “We must not neglect the nonmilitary means by which an enemy may seek to undermine our national will.” ~ Gordon Welchman~ I am reading a very interesting book by Gordon Welchman called, The Hut Six Story: Breaking the Enigma Codes. Welchman was recruited to work at Bletchley Park, by Alastair Denniston. Denniston was…
Connected
by
•The Voting Ecosystem The United States voting system is not made up of just voting machines. What do I mean by this? Electronic systems, including the voting machines are tied into a much larger infrastructure, that includes operating systems and applications, that run on many different hardware components, that communicate to even a much larger…
Connected
by
•Industrial Revolution 5.0 The Industrial Revolution 5.0 has officially started, even though many of us in technology are still addressing cybersecurity challenges of the Industrial Revolution 4.0. Industrial Revolutions are marked by economist and historians as they record shifts in societies. The first Industrial Revolution was identified by English economic historian, Arnold Toynbee. https://tinyurl.com/y4glae8g The…
Connected
by
•The Anatomy of a Cybersecurity Attack I have felt lately like we, in the cyber security community, are failing at our posts. Our clients are suffering from real day to day cybersecurity threats, turning off their computers at night, to wake up to the same scenario that they just left. We keep saying if you…
Connected
by
•Covid-19 and the Data There is a lot of misinformation about Covid-19. I am fortunate to work with, what I consider, the best data modeling tool presently available. Interset, is the name of the technology, which is being used to help provide a predictive model for Covid-19. What is Interset? How do I use it…
Connected
by
•Defend Forward The cybersecurity community has had a Defense in Depth strategy for well over a decade. What does that mean? From a practical home application, Defense in Depth, would start with a fence around your property as an example, then a lock on all points of entry into the house, such as doors and…
Connected
by
•Covid-19 and Changes to the Cybersecurity Landscape Covid-19 has changed the cybersecurity threat landscape. Often, the cybersecurity community looks to reduce the attack surface and provide less opportunity for bad actors. But Covid-19 has opened a very wide door and Advance Persistent Threats are on the rise, targeting businesses and individuals. Personally, I have had…