The Patient Hacker

It was not that many years ago that a successful security breach was based on speed. The hacker would perform reconnaissance to find the weak point in an organization’s defenses and use that as a vector to launch the attack. The attack would overwhelm resources, and before a meaningful defense could be launched by the…

The Weaponized Cyber Attack

Some tech historians point to June 2010 as the time that everything changed. This was the time when Stuxnet hit and reportedly disabled one-fifth of Iran’s nuclear centrifuges. Specifically targeting programmable logic controllers (PLCs), Stuxnet was unlike anything that was seen by the security community before. Rather than the carpet bombing methodology that most cyber attacks…

2001 A Space Odyssey In 2014

I love watching science fiction movies. In the movie 2001 A Space Odyssey, a rogue computer named HAL takes over a space mission for “the greater good of the mission”, putting human life at risk. This movie posed an interesting dilemma in that it was one of the first times that a machine could actually…

Beware Of Things That Don’t Go Bump In The Night

Picture a movie that depicts an intruder entering a house. There is a noise and typically the wife asks her spouse, “honey I heard something”. The lights go on and the husband descends the steps to the main floor with a bat in hand to apprehend the perpetrator. It is ironic that the same response…