Welcome! I am the Harbinger. A "harbinger" is someone or something that announces the approach of another. That is the goal of this blog. I will be providing a look ahead at the future of cyber security and at the forces that are shaping the future of this technological age.
Sociotechnical Project Video
Get link
Facebook
X
Pinterest
Email
Other Apps
-
This video is created for Unit 5 Discussion Board 2 post on our Sociotechnical Project.
One of the most important archaeological discoveries ever made is the Rosetta Stone. This ancient tablet, which contained the same text written in Greek and Ancient Egyptian, was the key to deciphering hieroglyphics—unlocking a lost language and, with it, centuries of history, culture, science, and religion. What many people don’t know is that prior to its rediscovery in 1799, the Rosetta Stone was being used as a mere brick in a medieval fortress wall. Its incalculable historical value was completely overlooked until French soldiers stumbled upon it during repairs. Now, imagine a tool with the potential to reshape the future of cybersecurity being used for little more than routine tasks. As crazy as it sounds, that’s exactly what many organizations are doing with Generative Artificial Intelligence (Gen AI). They recognize its existence and may use it for basic troubleshooting, installation instructions, or general problem-solving—but fail to explore its full power. Like the Rosetta St...
Tigran Petrosian Before working in IT security, I was a tournament chess player. One of my greatest influences was World Champion Tigran Petrosian—known not for flashy attacks, but for his near-supernatural ability to anticipate his opponent's plans and neutralize threats before they happened. That skill, known in chess as prophylaxis , is one that the world of cybersecurity desperately needs to adopt. From Chess to Cybersecurity: The Power of Prophylaxis Prophylaxis in chess is the ability to anticipate your opponent’s strategy and block it before they execute it. Petrosian’s style wasn’t dramatic or aggressive, but it was extremely effective. He rarely lost. In much the same way, cybersecurity professionals must anticipate and neutralize risks before they evolve into threats. Unfortunately, the current state of information security remains largely reactive. A scan finds vulnerabilities; the team patches them. A penetration test reveals gaps; the team scrambles to close them. An a...
"I'm sorry, Dave. I'm afraid I can't do that." – HAL 9000 Many science fiction fans will recognize this quote from the classic film 2001: A Space Odyssey, with HAL 9000 being the rather ambiguous villain in the story. However, viewers or those with only a casual familiarity with the story, often forget that HAL 9000 wasn’t evil. It was obedient. HAL was built to eliminate the risk of human error and it followed its programming to the letter. But when mission parameters conflicted with human judgment, HAL’s unwavering logic led to catastrophe. In cybersecurity, we’re facing a similar dilemma. For years, the weakest link in security was the human user. Every cyber security professional knew the phrase. Almost every certification quiz had some question about it. Employees click phishing links, reuse passwords, and misconfigure systems. So, just like the scientists in A Space Odyssey, we turned to automation: AI agents that could navigate web apps, handle rep...
Comments
Post a Comment