The Open Source Conundrum

Is It Really Open?There is a massive movement in the government right now to utilize open source code in an effort to prevent vendor lock-in.  Vendor lock-in is the issue wherein only one vendor can possibly support a given software release due to the complexity of...

Looking Correctly at Cyber OT

Informational Technology (IT) is primarily focused on the transfer, use, and in the case of cybersecurity, defense of data.  As such, IT cybersecurity attempts to find and destroy intrusions with little to no regard to operations. The evidence for this approach is...