More on the Security of the 2020 US Election

Last week I signed on to two joint letters about the security of the 2020 election. The first was as one of 59 election security experts, basically saying that while the election seems to have been both secure and accurate (voter suppression notwithsta… Continue reading More on the Security of the 2020 US Election

Ask Hackaday: With Landline Use in Decline, What’s to be Done with the Local Loop?

Walking is great exercise, but it’s good for the mind too: it gives one time to observe and to think. At least that’s what I do on my daily walks, and being me, what I usually observe and think about is the local infrastructure along my route. Recently, I was …read more

Continue reading Ask Hackaday: With Landline Use in Decline, What’s to be Done with the Local Loop?

How Roblox completely transformed its tech stack

Picture yourself in the role of CIO at Roblox in 2017. At that point, the gaming platform and publishing system that launched in 2005 was growing fast, but its underlying technology was aging, consisting of a single data center in Chicago and a bunch of third-party partners, including AWS, all running bare metal (nonvirtualized) servers. […] Continue reading How Roblox completely transformed its tech stack

IBM plans to spin off infrastructure services as a separate $19B business

IBM, a company that originally made its name out of its leadership in building a myriad of enterprise hardware (quite literally: its name is an abbreviation for International Business Machines), is taking one more step away from that legacy and deeper into the world of cloud services. The company today announced that it plans to […] Continue reading IBM plans to spin off infrastructure services as a separate $19B business

Proxies, Pivots, and Tunnels – Oh My!

Forward When talking about a proxy or a pivot or a tunnel, we could be talking about very different things.  However, to me, these terms could mean the same thing too.  A proxy could be considered a pivot, especially in ‘forward proxy’ mode, when it ma… Continue reading Proxies, Pivots, and Tunnels – Oh My!

3 Areas of Your IT Infrastructure that SCM Can Help to Secure

Gone are the days when security teams could focus all of their efforts on keeping attackers out of the network. There’s no inside or outside anymore. The modern network is porous; it allows greater numbers and types of devices to connect to it from all… Continue reading 3 Areas of Your IT Infrastructure that SCM Can Help to Secure

Using Disinformation to Cause a Blackout

Interesting paper: "How weaponizing disinformation can bring down a city’s power grid": Abstract: Social media has made it possible to manipulate the masses via disinformation and fake news at an unprecedented scale. This is particularly alarming from a security perspective, as humans have proven to be one of the weakest links when protecting critical infrastructure in general, and the power… Continue reading Using Disinformation to Cause a Blackout