Benjamin Langrill

Blog by Benjamin Langrill

Ever since the beginning days of "the cloud" I have always been skeptical of using "someone else's computer" to do sensitive work. I realize the incredible security effort companies like Amazon and Microsoft put into their systems -- commensurate to their Security Energy -- but ...

06.05.25 01:16 PM - Comment(s)

The answer: yes

 

The recent Bybit hack is great example of a highly sophisticated cyber-attack motivated by highly liquid money. It underscores how crypto-related companies need to scale their security energy to account for higher risk. The attackers made off with 1.4 Billion dollars in Ether ...

26.02.25 12:15 PM - Comment(s)

Two notable examples are:

  • Cyber training
  • Penetration testing

 

In the former, you can say "spend money/time on this cyber training and you will be get more $$$ at your job." The key thing to note is that this is mainly targeted at individuals or academia. Once in a job, there is limit...

29.01.25 02:00 AM - Comment(s)

What is cyber abundance? Where can someone spend money on cybersecurity and get more money back? Consider business development marketing where, "if you buy this service" or "implement these strategies", the ROI will be 5x, 10x, 100x! "Listen to these testimonials from clien...

10.12.24 02:25 AM - Comment(s)

 You are the cyber operations manager for the nation of Gorgas.

The targeting analyst on the other side of the table slides a paper over to you. It details a risk assessment of a proposed operation that will advance your national objectives but requires using some high value bespoke capabilit...

10.10.24 01:39 AM - Comment(s)