Category: Technology

Wild Techdom

Hi, I’m Mitchel and this is my assistant Ron. Welcome to Wild Techdom supported by Mutual of Bromaha. Today we travel to the far off wilds of the cube mazes of Silicon Valley. These are dangerous lands with an entire…

Beware the professional path. There be dragons here

So, there I was talking to some people and I talked about focus of my career not being the same as longevity in my job. You see, long before the gig economy I started moving between jobs and looking for…

Socrates and the Consensus Leader

“You’re always telling me what to do!” “You never tell me what to do!” “You’re to lazy to actually lead!”   A subordinate in a stressful situation can make a lot of allegations but the root of the problem may…

Dungeons and Data Centers

Dungeon Master: You are standing in a brilliant lit server roomed filled with millions of dollars in sunk legacy server costs. You: Roll the dice and advance. Dungeon Master: A DevOps ghoul jumps out from behind an IBM 360 running…

Attribution of cyber adversaries

Key Points: Attribution has three distinct layers; political, technical, and forensic with each having different confidence levels and analysis strategies Adversaries must interact with systems to exploit them and this creates evidence or anomalies that can be used for attribution…

Am I looking for a job?

I’m a senior executive, a subject matter expert, and an influential strategic leader in cyber security. Why would I always be looking for a job, why would I always be keeping my ear to the ground, and why would I…