The Open Source Conundrum

Is It Really Open?There is a massive movement in the government right now to utilize open source code in an effort to prevent vendor lock-in.  Vendor lock-in is the issue wherein only one vendor can possibly support a given software release due to the complexity of...

Looking Correctly at Cyber OT

Informational Technology (IT) is primarily focused on the transfer, use, and in the case of cybersecurity, defense of data.  As such, IT cybersecurity attempts to find and destroy intrusions with little to no regard to operations. The evidence for this approach is...

Isolation Is Missing The Big Picture

Every time I hear about cybersecurity efforts, the focus is on a single device, a given process, piece of malware, and so forth.  While people pay lip service to proliferation, the target is one user’s actions, one infection of one machine and so forth.  To understand...

Finding Innovative Funds

Where’s The Money?As a startup with exciting new ideas and approaches, all that separates small businesses from massive success is the right kind of funding.  The right kind of funding is the kind that does not strip away ownership, force short-sightedness on...

Hybrid Source Security

The Open Source MovementFor those living under a rock, there is a massive effort underway by the government, military, and large corporations to move away for proprietary, closed systems to open source projects.  There are just too many issues with closed source...

Stopping Malware’s Main Challenge

Why Malware Hurts A random office colleague opens a very realistic email and inadvertently downloads a small piece of software called a “payloader”.  That payloader then calls home and a remote hacker starts injecting various malware – viruses really...