In today’s complex threat landscape, a robust governance model for the Chief Information Security Officer (CISO) must ensure cybersecurity is strategically aligned with broader organizational goals. Establishing such a model involves more than just managing technical controls—it requires clear policies,…
The Fallacy of Innovation: Academia, Military, and Corporate Blindness
Innovation. It’s the buzzword of our time, paraded in corporate boardrooms, academic symposia, and military briefings. Everyone claims to be “thinking outside the box.” Yet, in practice, these institutions — academia, the military, and corporate America — are expert gatekeepers…
2024 Annapolis Sailboat Show VIP Tickets
I sat back, sipping my Oceans Bourbon, while an episode of Sailing Fair Isle played on the screen. I was watching closely, hoping to catch a glimpse of my sons, who were on a catamaran somewhere in the background while Steve…
AI for military officers (somebody build this please)
The AI-powered terrain analysis system for junior military officers would fundamentally transform how they assess battlefield environments and make critical decisions. In a real-world combat scenario, a junior officer leading a reconnaissance mission could query the system using natural language to assess…
A story about public education and outcomes
Say the thing that people immediately disagree with. As a former professor I get a lot of hate for not being all in on public school and teachers in general. Why would I who has been an educator not be…
The Perils of Mediocrity as a Goal
About 30 years ago, I cut an article out of a newspaper. Yes, there used to be these things called newspapers—physical sheets of paper with stories and articles printed on them. The ink, often slightly rubbery, would smudge your fingers,…
Understanding Common Cybersecurity Threats: A Guide to Staying Safe in the Digital World
If you take your phone everywhere, cyber is everywhere; cybersecurity threats are not just a possibility—they’re inevitable. Most people don’t realize the ubiquity of technology as it is integrated into our lives nearly seamlessly. As technology advances, so do the…
Importance of Cybersecurity in Today’s World
Our lives are increasingly digital, the importance of cybersecurity cannot be overstated. The very fabric of our personal, professional, and national security is interwoven with our ability to protect data, systems, and networks from an ever-growing array of cyber threats.…
Introduction to Cybersecurity
Cybersecurity is a multifaceted practice essential for protecting digital systems, networks, and data from an ever-growing number of threats. With Cybersecurity Awareness Month in full swing, now is the perfect time to explore the core terms and concepts that shape…
The Fallacy of Risk Management: Why CISOs Are Trapped in a Losing Game
The term “risk management” is heralded as the panacea for all security woes. CISOs are expected to quantify, prioritize, and mitigate risks with a precision that makes them seem like omnipotent guardians of an organization’s digital fortress. But here’s the…
Some EOTI crew in this YouTube video from Annapolis
Shift Happens: Navigating the Global Competition in the 21st Century
In the early 2000s, a compelling presentation called “Shift Happens” by Karl Fisch, Scott McLeod, and Jeff Brenman was shown in high schools, captivating students and educators alike. The presentation highlighted a rapidly evolving global landscape, emphasizing the necessity for…
The Crucible of Accountability: Unveiling the Unique Challenges of CISOs
In the aftermath of headline-grabbing cyber breaches like Uber, SolarWinds and MoveIT, Chief Information Security Officers (CISOs) find themselves navigating treacherous waters, facing unprecedented scrutiny from both governmental agencies and internal stakeholders. This scrutiny, which now includes the ominous specter…
China reunifies with Taiwan: It’s all the rage these days
Historically, China has claimed sovereignty over Taiwan and has not renounced the use of force to achieve reunification. There has been speculation that China has a timetable to take over Taiwan by 2027, aligned with the PLA centennial. Recent events…
Cybersecurity Wishes and Dreams: A policy to fix a lot of broken security programs.
In an era where cybersecurity threats are constantly evolving and becoming more sophisticated, organizations within (does not reflect any current or past employers’ positions thus) “THIS INDUSTRY” must prioritize the protection of their digital assets. A robust policy framework mandating a minimum…