Articles

  • Those Who Don't Fight Worry Die Young

    My title is from Alexis Carrel, the 1912 Nobel Prize winner in Medicine. While his warning was made a century ago, the message remains true: Worrying is not healthy.

  • The IoT Security Blindspot

    Handling this problem is very different than securing corporate-owned laptops or phones connecting to an on-premises network, and enterprises are now seeking ways to manage the Internet of Thing (IoT) landscape.

  • Sell Me This Firewall

    Instead, to sell firewalls, and MFAs, and SIEMs, and UEBAs, and the like – the salesperson must learn a different method. And if you clip and mail the coupon below, along with a check made out to me for one-hundred and fifty dollars, then I will share with you my incredible secret to selling cyber security solutions!

  • Do Not Respond to Fake Contracts

    Perhaps someone at Google might explain the following: Suppose that a new Gmail account is established with a portion of the user ID seemingly matching some company name. Maybe the new account is Main-Street-Insurance-123@gmail.com, or something like that. If that account suddenly starts blasting out PDF attachments that resemble fake contracts, then why don’t your filters drop the send? (I’ll hum the Jeopardy tune, while you think.)

  • Randomized Rethinking of Anti-Virus

    The 1973 Chevrolet Impala has a unique history: Originally a top-seller for GM during the waning years of Nixon's Administration, the full-sized vehicle surged in retro-interest during the 90s when it appeared as Kramer’s car on Seinfeld. This seems less noteworthy, however, than the fact that it was also one of the first cars to include an airbag. This design decision was much debated within GM, however, because airbags emphasized crashes over speed.

  • The Who and What of Email Security

    In the days of circuit-switched telephony, when Grandma dialed Grandpa, the phone company could easily determine that the caller’s identity was, in fact, Grandma. Such confidence melted away, however, with TCP/IP and the Internet. That is, when Kahn and Cerf decided to allow senders, instead of the network, to specify their identity, they created a flexible Internet protocol – but also one that required add-on overlays for authentication.

  • Chained Breach Simulation

    The first time I saw signatures used to detect attacks more than two decades ago, I knew that intrusion detection systems (IDS) would become a new protection category. It was thrilling to see a new security control come to life, and I give credit to the Air Force Information Warfare Center for leading the way on practical implementation. I became so enthused with IDS that I spent a year writing a textbook on the topic.

  • Tough Love for Israeli Cyber Start-Ups

    There’s an awesome scene in an old Michael J. Fox movie where he’s asked if he’s ever been to Italy. His clever response is this: “Wear the shoes, eat the food, never been.” Such dialogue illustrates what can happen when a country like Italy becomes a stereotypical caricature of its better-known products. Just add olive oil to the shoes and pasta, and for many observers – this is the sum of the entire Italian economy.

  • How China Will Achieve Global Cyber Superiority by 2025

    Daran habe ich gar nicht gedacht. (I did not even think about that). This was Einstein’s reaction when Leó Szilárd explained that a chain reaction in uranium could be used to produce a bomb. A letter was quickly dashed to FDR – and just six years later, the United States would detonate two nuclear weapons over the Japanese cities of Hiroshima and Nagasaki. Had the President been too busy to heed this warning, German physicists might have altered the course of history.

There has never been a more exciting time to be a technology executive.

Today’s technology executive plays a pivotal role in helping his or her organization respond to these forces of change. In essence, they serve as conductors to orchestrate the three pillars of organizational success – people, processes, and technology – and to draw upon their unique view of the enterprise to bring these elements into harmony.

 

The Strongest Executive Leadership Network

© 2020 HMG Strategy, LLC. All Rights Reserved.