Cybersecurity-Management Groups
From Wikipedia – “The attack surface of a software environment is the sum of the different points (for “attack vectors“) where an unauthorized user
From Wikipedia – “The attack surface of a software environment is the sum of the different points (for “attack vectors“) where an unauthorized user
Chaos – “behavior so unpredictable as to appear random, owing to great sensitivity to small changes in conditions.” There are
“Human trafficking is a growing global problem. According to the International Labor Office in Geneva The 2017 human trafficking estimate
I have been working on leveraging edge computing to identify “intent”. I think that most folks would agree that collecting
First there was the machine and the human – Industrial Revolution. The Industrial Revolution image is of a huge mechanical
I was asked to review the architecture of an Industrial Control System V2.0 (ICS). To protect the privacy of the
Defense At the Perimeter In days of old, Kings understood, that if they were to remain Kings, that they needed
Automation -WPAN-IOT For my next post on SRE, I was going to write about WPAN technologies – Bluetooth, Zigbee, Z-Wave
When I first started working with Azure and GCP, it became evident, that both platforms were providing services to solve
Some background. I recently reviewed an Industrial Control System (ICS). If you purchase gas, have electricity in your home, drink