Dr. Fred Cohen

Why does a 20 year old have access to TS/SCI and what do we do about it?

This is not the first time a young person has had authorized access to substantial amounts oftop secret sensitive compartmented information (TS/SCI) and leaked it. How could thishappen? It’s easy to understand… What do 20-year old people do in the military? Among other things, they are in the field being shot at and shooting, driving …

Why does a 20 year old have access to TS/SCI and what do we do about it? Read More »

So you’re looking for a cyber security board member for your public company

Good luck finding someone qualified… The SEC is apparently about to make it a requirement for public companies to report on “the board of directors’ cybersecurity expertise, if any, and its oversight of cybersecurity risk”.1 Some details: Why would it be hard to find someone like this? But here’s the rub And there are some …

So you’re looking for a cyber security board member for your public company Read More »

The Threat Environment

People who don’t have to do it seem to not understand the nature of the cyber threat. This very short summary is intended for everyone who is responsible for it to hand to everyone else to help start a conversation and gain mutual understanding. The 6 questions people are commonly taught to ask are: who, …

The Threat Environment Read More »

Gamification and the Metaverse

People seem to me to be having problems dealing with enjoying their lives lived increasingly online. I live a life largely online, and with the pandemic pushing people increasingly away from the physical interaction world, I think we might be getting to the point where we do more and more that produces less and less …

Gamification and the Metaverse Read More »

Keeping your cyber security program exciting!

The Capability Maturity Model notions that, starting from scratch, a program matures by goingthrough phases. Cyber Security as Sexy! Why don’t they invest the necessary resources? Getting to Managed is not that hard But I don’t want to! But that’s what computers are for! It takes time to mature Conclusions

Security load explode

I see all these claims about building highly complex cyber-security environments and cannot believe that this is even a concept given that we cannot seem to get even relatively simple software anywhere close to right. Screwing us for better user experience? Stop interpreting my content please! AI is too stupid to let loose AWS disk …

Security load explode Read More »

REQUEST DEMO