Blog categorized as Uncategorized

Ever since the beginning days of "the cloud" I have always been skeptical of using "someone else's computer" to do sensitive work. I realize the incredible security effort companies like Amazon and Microsoft put into their systems -- commensurate to their Security Energy -- but ...

06.05.25 01:16 PM - Comment(s)

The answer: yes

 

The recent Bybit hack is great example of a highly sophisticated cyber-attack motivated by highly liquid money. It underscores how crypto-related companies need to scale their security energy to account for higher risk. The attackers made off with 1.4 Billion dollars in Ether ...

26.02.25 12:15 PM - Comment(s)

Two notable examples are:

  • Cyber training
  • Penetration testing

 

In the former, you can say "spend money/time on this cyber training and you will be get more $$$ at your job." The key thing to note is that this is mainly targeted at individuals or academia. Once in a job, there is limit...

29.01.25 02:00 AM - Comment(s)

What is cyber abundance? Where can someone spend money on cybersecurity and get more money back? Consider business development marketing where, "if you buy this service" or "implement these strategies", the ROI will be 5x, 10x, 100x! "Listen to these testimonials from clien...

10.12.24 02:25 AM - Comment(s)

https://github.com/BoogleCloud/influence-energy/tree/main

 

These will help you determine threat mappings and ultimately what matters to your organization.

 

Two takeaways from this initial release:

 

The primary driver behind determining the energy mapping was determining the key 1-...

20.09.24 02:37 AM - Comment(s)