Peter W RungAug 23, 20196 minSecuring IoT in 2019 & Beyond - Part 24.1 Architecture The first major areas to address is the computer, network and security architecture itself. We need to come to reason wi...
Peter W RungAug 21, 20192 minState of Security Attack Vectors1 Overview On the Newsweek site for August 17, 2019, there’s an article titled, “20 TEXAS CITIES HIT BY COORDINATED RANSOMWARE ATTACK, ST...
Peter W RungAug 19, 20197 minSecuring IoT in 2019 & Beyond - Part 11 Overview Many sources estimate that by end of 2020, 50 billion Internet of Things (IoT) devices will be deployed worldwide leading to a...
Peter W RungJul 15, 20193 minSoftware Defined Perimeters (SDP) - The Gateway to Zero Trust Environments (ZTE)Software Defined Perimeter (SDP) An SDP is one of the pillars of a Zero Trust Environment (ZTE). It is network security architecture that...
Peter W RungJun 24, 20192 minIs the United States Prepared For And Protected From An Attack On Our Power Grids?In a recent article published by WIRED http://bit.ly/2FoRF4t The Highly Dangerous ‘Triton’ Hackers Have Probed the US Grid we learned of ...