CYA

The Security Problem of C.Y.A. A few years ago while working with a large utility, it was revealed that the protection against a cybersecurity attack was to build a redundant system.  It needs to be noted that these systems are incredibly expensive and would be...

Connecting The Dots

How Things Get Hacked In The IoT When people create specific devices, they are somewhat aware of the issues surrounding security.  Nobody is going to put a completely unsafe device on the market or nobody will buy it (we hope).  Yet most of these makers do not...

Where’s The Security?

Where’s The (IoT) Security? We really attempted to use some variant of “Where’s The Beef” as that plays well with the older folks but we just could not work it into this post. Sorry about that. If you are unaware of IoT, it stands for the...

Bad Behavior

Bad Behavior For most of the evolution of programming and IT in general, the actual behaviors exhibited by an application, system or device have been controlled via code that a developer writes into some compiled executable.  The way an application responds to a...