Blogs by Joseph E. Krull

August 18, 2020

We’re less than three months from the U.S. presidential election, and the Democratic and Republican conventions will take place over the next week. The COVID-19 pandemic forced significant changes in these conventions, and a raging debate continues regarding voting by mail. Let’s leave the vote by mail issue aside for now and focus on election cybersecurity.

April 6, 2020

I use Zoom video conferencing and will continue to use it despite the negative press reporting.

January 23, 2020

In 2019, attackers continued to target third parties, service providers, and supply chain partners with the intention of broadening the scale and impact of their attacks. Notable instances in 2019 included the following:

December 16, 2019

In 2020, we will see substantial increases in wireless data speeds as well as new applications and business models that will leverage fifth-generation (5G) wireless and Wi-Fi 6 (802.11ax). Both technologies will give enterprise users, consumers, and, yes, attackers the ability to rapidly transfer an enormous amount of data using new devices that will become available in 2020. The potential impact of these wireless technologies should be included in enterprise risk assessments and factored into policies such as bring your own device (BYOD).

Pages