Subscribe

Cybersecurity
The Threat Risk is a function of likelihood times impact.  When it comes to zero-day exploits, particularly those that use return-oriented programming (ROP) or one of its many cousins the likelihood is high, and the impact is higher.  How do these attacks work, and what is the industry doing to stop them?  More importantly, what can you do to stop them?  Is it possible to stop a zero-day without patching or updating systems?  Let’s explore these questions. How ROP Works
Digital Design
Digital design data is a big data business. It requires secure management and storage, versions need to be stringently controlled, and teams need to access files readily so they can share that data with stakeholders. For too long, however, designers, engineers, and CAD managers have relied on traditional document management systems, like network drives, to achieve this. While they do a great job with office documents, those same solutions don’t work well with today’s design files and models, for several reasons:
Digital Design
AutoCAD 2021 is here! On March 25, 2020, Autodesk announced the release of AutoCAD 2021 the latest iteration of its flagship software first released in 1982. A key update includes a new integration with Google Drive allowing users to access their designs wherever they are as well as performance enhancements. Let’s break down what’s new.
Cybersecurity
The Cyberspace Solarium Commission recently released a groundbreaking report detailing 75 recommendations for improving the cybersecurity of the nation, including both the private and public sectors. The Commission, bipartisan in both name and spirit, conducted over 300 meetings with industry, academia, U.S. government, think tanks and foreign governments. I had the privilege of participating in this effort. The result is a comprehensive report that urges immediate and concrete action on its recommendations, organized into six pillars”:
Cybersecurity
Last week, my associate, Shane Rogers, shared an article on GovCybersecurityHub discussing the Cybersecurity Maturity Model Certification (CMMC) and its potential impact on small- and medium-sized government contractors.
Cybersecurity
I recently had the opportunity to visit an amazing new facility—the Cyber Range at Tech Data—and got to meet the truly exceptional people who make it happen. The facility has many purposes, stemming from the powerful sense of mission that drives the staff.