This is an abbreviated version of my Identity Catechism piece that I wrote in early 2019. This piece focuses on the three key topics to focus on when planning and…
Quantum mechanics often has difficulty breaking through to the general public, which is where the importance of “Schrödinger’s Cat” lies. The thought …
Dead or alive, left-spinning or right-spinning—in the quantum world particles such as the famous analogy of Schrödinger’s cat can be all these things at the same time. An international team,…
Adopting zero-trust and micro-segmentation as core design principles can help improve the security posture of your network and attached systems. However, it is important to understand how we got to…
Successful cybersecurity attacks can be so severe that they shut down business operations, erode the public’s trust in an organization and require substantial financial resources to go toward recovering. So,…
Staying on top of the latest cybersecurity risks and preferred attack methods can feel impossible, but standards like FIDO2 are designed to help relieve the burden.
3 Fundamental Questions to Ask of Your Identity Program
This is an abbreviated version of my Identity Catechism piece that I wrote in early 2019. This piece focuses on the three key topics to focus on when planning and…
Scientists Build Schrödinger’s Cat on a Quantum Level
Quantum mechanics often has difficulty breaking through to the general public, which is where the importance of “Schrödinger’s Cat” lies. The thought …
Announcing “Gotta Catch ‘Em All: Understanding How IMSI-Catchers Exploit Cell Networks”
Schrödinger’s cat with 20 qubits
Dead or alive, left-spinning or right-spinning—in the quantum world particles such as the famous analogy of Schrödinger’s cat can be all these things at the same time. An international team,…
The basics of quantum computing—A tutorial
What is quantum computing? Quantum computers shine when solving involves number or data crunching with huge amounts of inputs. They are …
When Perceived Cybersecurity Risk Outweighs Reality
Teams need to manage perceived risks so they can focus on fighting the real fires.
Security & the Infinite Capacity to Rationalize
To improve the security posture of our organizations, we must open our eyes to rationalization and put an end to it with logic. Here’s how.
Network Security: Keys to Adopting Zero-Trust, Micro-segmentation
Adopting zero-trust and micro-segmentation as core design principles can help improve the security posture of your network and attached systems. However, it is important to understand how we got to…
How AI Is Improving Threat Protection
Successful cybersecurity attacks can be so severe that they shut down business operations, erode the public’s trust in an organization and require substantial financial resources to go toward recovering. So,…
Demystifying New FIDO Standards & Innovations
Staying on top of the latest cybersecurity risks and preferred attack methods can feel impossible, but standards like FIDO2 are designed to help relieve the burden.
New Algorithm to Better Understand Quantum-to-Classical Transition
Researchers from Los Alamos National Laboratory have created a new quantum computing algorithm that helps gain better insights into the …
Writing Better Risk Statements
I found this post on my computer. I can’t remember where it originally was posted (if it was at all), but I found it useful and thought I’d repost it…