Welcome! I am the Harbinger. A "harbinger" is someone or something that announces the approach of another. That is the goal of this blog. I will be providing a look ahead at the future of cyber security and at the forces that are shaping the future of this technological age.
Sociotechnical Project Video
Get link
Facebook
X
Pinterest
Email
Other Apps
-
This video is created for Unit 5 Discussion Board 2 post on our Sociotechnical Project.
One of the most important archaeological discoveries ever made is the Rosetta Stone. This ancient tablet, which contained the same text written in Greek and Ancient Egyptian, was the key to deciphering hieroglyphics—unlocking a lost language and, with it, centuries of history, culture, science, and religion. What many people don’t know is that prior to its rediscovery in 1799, the Rosetta Stone was being used as a mere brick in a medieval fortress wall. Its incalculable historical value was completely overlooked until French soldiers stumbled upon it during repairs. Now, imagine a tool with the potential to reshape the future of cybersecurity being used for little more than routine tasks. As crazy as it sounds, that’s exactly what many organizations are doing with Generative Artificial Intelligence (Gen AI). They recognize its existence and may use it for basic troubleshooting, installation instructions, or general problem-solving—but fail to explore its full power. Like the Rosetta St...
Tigran Petrosian Before working in IT security, I was a tournament chess player. One of my greatest influences was World Champion Tigran Petrosian—known not for flashy attacks, but for his near-supernatural ability to anticipate his opponent's plans and neutralize threats before they happened. That skill, known in chess as prophylaxis , is one that the world of cybersecurity desperately needs to adopt. From Chess to Cybersecurity: The Power of Prophylaxis Prophylaxis in chess is the ability to anticipate your opponent’s strategy and block it before they execute it. Petrosian’s style wasn’t dramatic or aggressive, but it was extremely effective. He rarely lost. In much the same way, cybersecurity professionals must anticipate and neutralize risks before they evolve into threats. Unfortunately, the current state of information security remains largely reactive. A scan finds vulnerabilities; the team patches them. A penetration test reveals gaps; the team scrambles to close them. An a...
Long before I ever heard of Dungeons and Dragons, my first role-playing game experience was the futuristic world of Cyberpunk, where hackers, called ‘Netrunners,’ battled each other in cyberspace in pursuit of wealth and power. Back then, the idea of an AI jacking into corporate systems, rewriting its own code on the fly, and outmaneuvering security agents was both thrilling and purely fictional. But today, those neon-soaked fantasies are starting to look more like forecasts. The difference? The AIs aren’t avatars in the grid. They’re real, and they’re rewriting the rules of cybersecurity in the background while most of us are still playing catch-up In today’s cybersecurity landscape, the line between science fiction and operational reality is disappearing fast. Earlier this month, Wired reported that the AI tool XBOW is now topping HackerOne’s vulnerability leaderboard. Simultaneously, so-called "blackhat LLMs" like WormGPT and FraudGPT have been quietly circulating in Di...
Comments
Post a Comment