trulight

                 consulting

BLOG

 

Why Oldsmar??

Oldsmar Florida Water Utility was hacked by cyber criminals.  (In case you missed it https://www.tampabay.com/news/pinellas/2021/02/08/someone-tried-to-poison-oldsmars-water-supply-during-hack-sheriff-says/)  The obvious question for me is why?  Many are responding to...

SolarWinds Again

SolarWinds Flares     SolarWinds seems to be the vulnerability that just keeps giving.  As is typical in the world of cyber, when a vulnerability is disclosed, it gains the spotlight and garners a great deal of attention from researchers and hackers alike.  SolarWinds...

SolarWinds

Originally post 12/30/2020 By now everyone in the IT world, and many on main street, are aware of the SolarWinds breach.  The fact that top tier firms like FireEye Security and Microsoft, among others, sustained hacks using SolarWinds to infiltrate their network...

CJIS

Criminal Justice Information Services, better known as CJIS, was established in 1992.  The CJIS Division of the FBI is an intelligence center located in West Virginia. Used by almost 18,000 law enforcement agencies across the country, CJIS gives federal, state and...

SUDO Vulnerability

Phil Collins was ahead of his time  There's this girl that's been on my mind All the time, Su-Sussudio Oh oh Now she don't even know my name But I think she likes me just the same Su-Sussudio Woah oh  Ok maybe Phil Collins was not a cyber-criminal, but the...

Does Your Computer Read the Newspaper?

Does your network read the newspaper?  In the last few weeks several critical cyber vulnerabilities have been front page news.  From Windows, to Cisco, to Evernote, etc. It seems a new cyber risk is announced daily; however, my networks, servers and PCs, don’t read...

Cyber Security In Pandemic

Originally Posted February 2020   Bird Flu, SARS, MERS and now Coronavirus (COVID-19).  Recent outbreaks of pandemic viruses or even potential pandemic viruses have caused widespread concern and discussion of “what if”.  The World Health Organization has put out many...

Full Contact Chess

Cyber Security is Full Contact Chess   I like to think of Cyber Security as full contact chess.  Its not just a strategy engagement and it is not a bull in the china shop.  Strategy without backbone will cost you.  Big bells and whistles without a strategy will cost...

Strategy

Strategy A technical strategy for moving an organization forward takes into account the areas that you can take advantage of in a technological complex environment, while at the same time minimizing risk for those areas that you cannot control.  While risks are ever...

Technology Touches Everything

A remarkable shift has occurred in the business world over the past 10 years.  Technology is transforming from being a purely support function to becoming a full-fledged partner in the business process.  If only all business leaders would recognize that without...

Illuminating a Path