Is Zero Trust Unimplementable?

I won’t bore you with explaining everything about the Zero Trust manifesto. But I believe ZT must be looked at for its successes or the apparent multitude of documented failures. It reminds me of the Harvard Balanced Score Card. Great idea; but wholly impractical. For those unfamiliar GSA has an excellent guideline on ZT Architecture […]

MITRE ATT&CK Hunter-Killer Cyber Strategy Adoption Is Imperative

The author Alexander Dore worked in Military Flight Test based out of Edwards AFB and New Naval Stealth Technology out of Pearl Harbor for many years. Dore also worked on the development of virtual manufacturing and embedded security on the F-32 Joint strike Fighter (JSF) development with Dassault Systemes and IBM. Dore also worked with […]

The Importance of Cybersecurity in Today’s Digital Age

As technology continues to develop and more of our daily activities shift online, cybersecurity has become a pressing concern. With the growing amount of cyber dangers, it is more vital than ever to take precautions to safeguard yourself and your personal data. In this digital age, cybersecurity is no longer only a worry for organisations, […]

Understanding the Risks of Cyber Attacks and How to Protect Your Business

Cyber threats have become a big concern for businesses of all sizes in the modern digital world. As more sensitive information is kept and communicated online, it is essential for organisations to understand the risks of cybercrime and take precautions against them. Data breaches are one of the main risks associated with cyber attacks. These […]

Stay Ahead of the Game: Best Practices for Cybersecurity in the Workplace

Cybersecurity is a rising problem for businesses of all sizes, and proactive measures must be taken to safeguard sensitive data and systems. In the modern digital era, cyber risks are always growing, making it crucial to stay ahead of the curve and apply best practises for workplace cybersecurity. Educating staff about cybersecurity is one of […]