Author Archives: Editor

Pre-Trained AI Models: Build Your Company’s Private AI

I once worked with a colleague who consistently interrupted my workflow seeking guidance on performing his tasks. I am not exaggerating when I say that not even 10 minutes would elapse without him posing a question or two, necessitating me … Continue reading

Posted in A.I., Articles | Tagged | Comments Off on Pre-Trained AI Models: Build Your Company’s Private AI

What is this revolutionary Q* AI discovery: The Discovery That Threatens Humanity

Q* (pronounced Q-Star) is the latest buzzword in artificial intelligence circles. It appears that it might have been behind the motivation for OpenAI’s CEO firing. The problem is this: nobody knows exactly what Q* is about, other than it’s the … Continue reading

Posted in A.I., Articles | Tagged , , | Comments Off on What is this revolutionary Q* AI discovery: The Discovery That Threatens Humanity

Password length 101

You probably heard someone tell you to change your password. Well, in this article, I will try to demystify the world of passwords. This should give you a better appreciation about changing password length to subdue potential breach of your … Continue reading

Posted in Articles, Cybersecurity, Systems | Tagged , , | Comments Off on Password length 101

How important is a SIEM to Cybersecurity

“Upmost importance” would describe a SIEM within an organization. Let’s do a high level view of what a SIEM is. “Security Information & Event Management” and its acronym is SIEM. Most SIEM come in form of software which is installed … Continue reading

Posted in Articles, Cybersecurity, Network, Systems | Tagged , , | Comments Off on How important is a SIEM to Cybersecurity

Still Don’t Understand Zero-Trust? Watch this!

I have observed that many individuals, including cyber-security professionals, often fail to fully comprehend the essence of “Zero-Trust.” They mistakenly perceive it as a technology or a product, when in reality, it is a comprehensive approach, a mindset, and a … Continue reading

Posted in Articles, Cybersecurity, Network, Security | Tagged , , , , | Comments Off on Still Don’t Understand Zero-Trust? Watch this!

Bing Chat and ChatGPT can’t handle basic logic

Bing Chat To see if Bing Chat was able to handle logic problem, I submitted a question to Microsoft’s Bing Chat and received a strange answer. Here’s the question to Bing Chat. Question: If you line-up 3 wet towels on … Continue reading

Posted in A.I., Articles | Tagged , | Comments Off on Bing Chat and ChatGPT can’t handle basic logic

Two WiFi Stories: The Art of not Falling Victim to Ignorance

Here are two Wireless Network (WIFI) true stories I would like to share. The first one happened to one of my sisters, the other is something I discovered a long time ago while hacking around my network. Those Friendly Neighbors: … Continue reading

Posted in Articles | Tagged , | Comments Off on Two WiFi Stories: The Art of not Falling Victim to Ignorance

iPhone Airdrop Prank Lands Man in Jail

In October 2022, Keith Diemer, aged 35, was aboard a flight departing from Dallas. During the course of the flight, he made the ill-advised decision to play a prank on fellow passengers by utilizing Apple’s Airdrop feature to send a … Continue reading

Posted in Articles, Stories | Tagged | Comments Off on iPhone Airdrop Prank Lands Man in Jail

Formula used by phone scammers

The formula: “Phonecall + Asking for Money = Scam” is generally true. Many scams involve a caller who makes unsolicited calls or sends unsolicited messages, and then asks the recipient to send money or provide personal information. Common types of … Continue reading

Posted in Articles, ChatGPT | Tagged , , , | Comments Off on Formula used by phone scammers

What’s a Password-Less Environment

A password-less environment refers to a system or platform that eliminates the need for traditional passwords as a means of authentication. In this type of environment, users are authenticated through alternative methods such as biometrics, security keys, or one-time codes … Continue reading

Posted in Articles, ChatGPT | Tagged , | Comments Off on What’s a Password-Less Environment

Is CyberSecurity for you?

As my internet travels bring me to various cybersecurity forums and chat rooms, I have the opportunity to listen to people’s life stories and how they are trying to do what they were told they should do. What’s wrong with … Continue reading

Posted in Articles, Stories | Tagged , , | Comments Off on Is CyberSecurity for you?

CrytoCurrency explained – rubber hose crytanalysis

I don’t have much comments in this article simply because I think the youtuber Josh Madakor does a smashing job explaining how CrytoCurrency works and why it’s not ready for the mainstream. I fully stand behind his analysis, specially the … Continue reading

Posted in Articles, Crypto | Tagged , , , , | Comments Off on CrytoCurrency explained – rubber hose crytanalysis

Better than Zero-Trust ?

You read this correctly, amputate that source IP at your firewall network connections and dramatically increase your survival of a CyberAttacks, and this, at a fraction of the cost of zero-trust framework. As a professional IT person with +30 years … Continue reading

Posted in Articles, Firewalls | Tagged , | Comments Off on Better than Zero-Trust ?

Protect your Fortigate with LOCAL-IN policies

One of the biggest mistake made while deploying a Fortigate firewall is focussing strictly on its policies between zones or interfaces. Little do people know, LOCAL-IN policies also need configuration to protect the firewall from exposing remote access to it’s … Continue reading

Posted in Articles, Firewalls | Tagged , , , | Comments Off on Protect your Fortigate with LOCAL-IN policies

Eradicating phishing attacks using multiple email servers

Do you remember when email servers were very efficient, dramatically increased companies internal communications and we absolutely not susceptible to any kind of phishing attacks, spams or viruses? I do! Thirty years ago, that’s how it was and learning from … Continue reading

Posted in Articles, Servers | Tagged , , , , , | Comments Off on Eradicating phishing attacks using multiple email servers

Protect your car against theft using Faraday

L et’s shop for a new vehicle ! This story begins when I stopped at a local Honda dealer to check out their new SUVs. The sales person (Louis) jumped right in, eager to help me buy a vehicle. After … Continue reading

Posted in Articles, Stories | Tagged , , , , | Comments Off on Protect your car against theft using Faraday

AI and the God question

As I was scrolling thru the internet to watch more obscure movies (Yeah, I’m a movie junky), I stumbled on this little gem which explorers the question of the existence of “a God” using an advanced artificial intelligence computer which … Continue reading

Posted in A.I., Articles | Tagged , | Comments Off on AI and the God question

The powers of updating

Patch Management If there is one thing, a single thing, you can do to greatly improve your chances of fending off cyberattacks, it’s adopting a good digital hygiene strategy. In other words, adopting and implementing a comprehensive best practice methodology … Continue reading

Posted in Articles, Updating | Tagged , , | Comments Off on The powers of updating

Machine learning and cheating

Machine learning is a process that gives the ability to predict outcomes using past events. During my career, I realized that I was getting very good at predicting the probability of outcomes and/or root cause of issues. My boss always … Continue reading

Posted in A.I., Articles | Tagged , , | Comments Off on Machine learning and cheating

From Laces to AI – The Connection

While researching the ups and downs of AI (Artifician Intelligence), I stumbled on this cool youtube video which makes the connections between 17th century automated lace making, creativity and AI. If you are old enough to remember the excellent “Connections” … Continue reading

Posted in A.I., Articles | Tagged , , | Comments Off on From Laces to AI – The Connection

Companies, mind your phone systems !

I used to work for a private company that had state of the art network security and strict security policies on everything, except their phone system, and this article will discuss the risk of crafty people from syphoning information from … Continue reading

Posted in Articles, Stories | Tagged , , , | Comments Off on Companies, mind your phone systems !

Starlink: Elon Musk’s legacy

The moment I read about Elon Musk’s Starlink program which would place in orbit over 10,000 satellites in low orbit (500 Km), I though to myself “This is a disaster in search of a bible proportion moment”. Being a licensed … Continue reading

Posted in Articles, Stories | Tagged , , | Comments Off on Starlink: Elon Musk’s legacy

CMMC 2.0

Cybersecurity Maturity Model Certification Department of Defense (DoD) Contractor community is now required to build and maintain a proper cybersecurity posture to help protect the US from its adversaries.  The official CMMC rollout will occur over several years to encompass … Continue reading

Posted in Articles, Documents | Tagged | Comments Off on CMMC 2.0

NIST CyberSecurity Framework

Here is a useful NIST.GOV’s CyberSecurity Framework grid to help you memorise your cyber security strategy.   NIST’s website: https://www.nist.gov/cyberframework  

Posted in Articles, Documents | Tagged , , | Comments Off on NIST CyberSecurity Framework

Security Certification Roadmap

Paul Jerimy compiled a cool map of all security certifications. With bookmarking this website! Security Certification Roadmap

Posted in Articles, Documents | Tagged , , | Comments Off on Security Certification Roadmap