My days in technology began when the Internet, cell phones, and personal computers did not exist; computers were so large at this time that just one would fill an entire room, and putting information into that computer meant typing your program, line by line, on individual punch cards. And all…
As a veteran security practitioner, I can attest that the cybersecurity and information security landscape has evolved dramatically in the last 30+ years. At the beginning of my career in IT, the ability to recover data from a hard disk drive was just starting to become possible, and the first…
What Will Underpin Organizations’ Cybersecurity Priorities in 2021? My days working in and then with law enforcement began when personal computers were becoming more mainstream and the interconnection of computer systems around the world began with a USA Department of Defense project (ARPANET) and then a project out of CERN.…
When I was studying to become a Certified Novell Instructor and then a Microsoft Certified Trainer way back in 1993, the internet was only beginning to come into being and private computer networks came in two forms: “sneakernet” and a pile of competing technologies including ArcNet, Token Ring, and some…
AI is slowly growing in its use and its maturity. So, should there be controls placed on its use, development, and future? As a young man, I spent a considerable amount of time reading, and my favorite reading pastimes were science fiction and science. I enjoyed science fiction authors, such…