trulight

                 consulting

BLOG

 

Open Source

Open Source     I was giving a presentation a few months ago at a conference.  The presentation was on “organization cyber security”.  I touched on a few of the most common cyber security vulnerabilities and mentioned open-source software that gets downloaded onto...

Unknown Threat

While I was sitting in the CIO seat, I would be asked regularly about the latest cyber-attack.  “Does thinking about the WannaCry virus keep you awake at night?” or “How do you sleep knowing the SolarWinds hack was successful?”  My response was always the same.  I...

Why Oldsmar??

Oldsmar Florida Water Utility was hacked by cyber criminals.  (In case you missed it https://www.tampabay.com/news/pinellas/2021/02/08/someone-tried-to-poison-oldsmars-water-supply-during-hack-sheriff-says/)  The obvious question for me is why?  Many are responding to...

SolarWinds Again

SolarWinds Flares     SolarWinds seems to be the vulnerability that just keeps giving.  As is typical in the world of cyber, when a vulnerability is disclosed, it gains the spotlight and garners a great deal of attention from researchers and hackers alike.  SolarWinds...

SolarWinds

Originally post 12/30/2020 By now everyone in the IT world, and many on main street, are aware of the SolarWinds breach.  The fact that top tier firms like FireEye Security and Microsoft, among others, sustained hacks using SolarWinds to infiltrate their network...

CJIS

Criminal Justice Information Services, better known as CJIS, was established in 1992.  The CJIS Division of the FBI is an intelligence center located in West Virginia. Used by almost 18,000 law enforcement agencies across the country, CJIS gives federal, state and...

SUDO Vulnerability

Phil Collins was ahead of his time  There's this girl that's been on my mind All the time, Su-Sussudio Oh oh Now she don't even know my name But I think she likes me just the same Su-Sussudio Woah oh  Ok maybe Phil Collins was not a cyber-criminal, but the...

Does Your Computer Read the Newspaper?

Does your network read the newspaper?  In the last few weeks several critical cyber vulnerabilities have been front page news.  From Windows, to Cisco, to Evernote, etc. It seems a new cyber risk is announced daily; however, my networks, servers and PCs, don’t read...

Cyber Security In Pandemic

Originally Posted February 2020   Bird Flu, SARS, MERS and now Coronavirus (COVID-19).  Recent outbreaks of pandemic viruses or even potential pandemic viruses have caused widespread concern and discussion of “what if”.  The World Health Organization has put out many...

Full Contact Chess

Cyber Security is Full Contact Chess   I like to think of Cyber Security as full contact chess.  Its not just a strategy engagement and it is not a bull in the china shop.  Strategy without backbone will cost you.  Big bells and whistles without a strategy will cost...

Illuminating a Path