Blogs by Joseph Krull

January 23, 2020

In 2019, attackers continued to target third parties, service providers, and supply chain partners with the intention of broadening the scale and impact of their attacks. Notable instances in 2019 included the following:

December 16, 2019

In 2020, we will see substantial increases in wireless data speeds as well as new applications and business models that will leverage fifth-generation (5G) wireless and Wi-Fi 6 (802.11ax). Both technologies will give enterprise users, consumers, and, yes, attackers the ability to rapidly transfer an enormous amount of data using new devices that will become available in 2020. The potential impact of these wireless technologies should be included in enterprise risk assessments and factored into policies such as bring your own device (BYOD).

November 25, 2019

I recently had the opportunity to take a public tour of an Amazon fulfillment center in Texas. It was an amazing experience and left me with a clear impression that loss of availability can have a colossal and devastating cyber impact on any organization with complex supply chains or time-sensitive customer services. We all focus on confidentiality of data, but in this case, availability took center stage.   

October 28, 2019

From my first days as a private in the Army so many years ago, it was drummed into me that I needed to “know the enemy.” At that time, my platoon was regularly shown photographs and movies that depicted Soviet and Warsaw Pact soldiers in various states of fierceness. I have memories of the visions of hordes of burly soldiers in Soviet uniforms bounding through the snow and doing aggressive maneuvers. Our unit spent countless hours studying Soviet equipment, identifying tanks and aircraft, and delving into minutiae like a Soviet solder’s daily routine and diet. Yes—we knew our enemy.

Pages