Is Zero Trust Unimplementable?

I won’t bore you with explaining everything about the Zero Trust manifesto. But I believe ZT must be looked at for its successes or the apparent multitude of documented failures. It reminds me of the Harvard Balanced Score Card. Great idea; but wholly impractical. For those unfamiliar GSA has an excellent guideline on ZT Architecture […]

MITRE ATT&CK Hunter-Killer Cyber Strategy Adoption Is Imperative

The author Alexander Dore worked in Military Flight Test based out of Edwards AFB and New Naval Stealth Technology out of Pearl Harbor for many years. Dore also worked on the development of virtual manufacturing and embedded security on the F-32 Joint strike Fighter (JSF) development with Dassault Systemes and IBM. Dore also worked with […]

Stay Ahead of the Game: Best Practices for Cybersecurity in the Workplace

Cybersecurity is a rising problem for businesses of all sizes, and proactive measures must be taken to safeguard sensitive data and systems. In the modern digital era, cyber risks are always growing, making it crucial to stay ahead of the curve and apply best practises for workplace cybersecurity. Educating staff about cybersecurity is one of […]