Why Are we in a Big Cybersecurity Mess?

To answer this question logically and truthfully we have to go back to how computers have evolved and connected to each other. During WW2 the beginning stages of electronic machines tabulating artillery tables faster and more accurately than humans (Colossus mark 1 and 2) (public Domain picture) As the computers evolved more and more effort … Read more

Attack Life Cycle Changed By Cloud

Great video from BSides Columbus Ohio 2018 : “Zero to Owned in 1 Hour” That is an interesting review of how the new potential weaknesses are in the Cloud itself. Human Access to the cloud can be a weak point. AWS (Amazon Web Services) Does Multi-factor Authentication work with multiple people running things? Service Provider (cloud … Read more

More Security or More Business? is it Us vs Them?

When we say We need to be more secure in cyberland, does that mean small business needs to change what they do to be more secure? ISACA says we need governance: Governance and management for Enterprise business should use the COBIT 5 principles Principle 1: Meet stakeholder needs Principle 2: Covering the enterprise from end-to-end … Read more