Cloud Eats Security
Shutterstock

Predictions 2022: Cloud Eats Security

Over the past 20 years, cybersecurity has persistently played an unwinnable game.  In this game, the attacker makes all the rules, sets all the timers, records all the scores, and can walk away from the game anytime without losing anything. Meanwhile, the defenders are encumbered with a cavalcade of rules, tools, and fools: insidious compliance…

READ MORE
Zoom Risks

CIO Zoom 5.0 Video Conferencing Risks: Still not failsafe?

Zoom 5.0 video conference service (VS) is not safe for most businesses due to ongoing data security risks! During the COVID-19 tidal wave, many millions in the workforce had to work at home, if possible. Many organizations needed to stand up missing video conferencing services fast. Growing numbers of remote workers adopted Zoom’s no/low cost,…

READ MORE
1892 wooden ballot box

Iowa caucuses and the Shadow app: A lesson in critical infrastructure

On Monday 3 February 2020, Iowans caucused at almost 1700 precincts across the state to select their preferences among presidential candidates.  Three days after the Iowa caucuses, the final tallies for the Democratic presidential candidates remained incomplete.  The popular press blames a technical glitch in the Shadow app, but accountability resides with party leaders and…

READ MORE