Welcome! I am the Harbinger. A "harbinger" is someone or something that announces the approach of another. That is the goal of this blog. I will be providing a look ahead at the future of cyber security and at the forces that are shaping the future of this technological age.
Sociotechnical Project Video
Get link
Facebook
X
Pinterest
Email
Other Apps
-
This video is created for Unit 5 Discussion Board 2 post on our Sociotechnical Project.
One of the most important archaeological discoveries ever made is the Rosetta Stone. This ancient tablet, which contained the same text written in Greek and Ancient Egyptian, was the key to deciphering hieroglyphics—unlocking a lost language and, with it, centuries of history, culture, science, and religion. What many people don’t know is that prior to its rediscovery in 1799, the Rosetta Stone was being used as a mere brick in a medieval fortress wall. Its incalculable historical value was completely overlooked until French soldiers stumbled upon it during repairs. Now, imagine a tool with the potential to reshape the future of cybersecurity being used for little more than routine tasks. As crazy as it sounds, that’s exactly what many organizations are doing with Generative Artificial Intelligence (Gen AI). They recognize its existence and may use it for basic troubleshooting, installation instructions, or general problem-solving—but fail to explore its full power. Like the Rosetta St...
Before World War II , France poured its military resources into building the Maginot Line, a massive chain of fortifications designed to prevent a German invasion. It was an engineering marvel and a symbol of confidence in modern defense strategy. But it failed. Germany bypassed the Maginot Line by advancing through the Ardennes Forest, an area France had deemed too rugged and irrelevant to defend. That assumption proved fatal. By ignoring an older vulnerability in favor of a newer, more "obvious" threat vector, France left itself open to a devastating attack. In cybersecurity, we’re making the same mistake. Just a few years ago, I was purchasing books on pentesting IoT devices and completing Udemy courses on IoT security. It felt like the next big cybersecurity frontier, a sprawling, vulnerable ecosystem of smart locks, thermostats, TVs, and routers, all running outdated firmware and barely protected APIs. But over time, that focus faded. The industry shifted almost ent...
Tigran Petrosian Before working in IT security, I was a tournament chess player. One of my greatest influences was World Champion Tigran Petrosian—known not for flashy attacks, but for his near-supernatural ability to anticipate his opponent's plans and neutralize threats before they happened. That skill, known in chess as prophylaxis , is one that the world of cybersecurity desperately needs to adopt. From Chess to Cybersecurity: The Power of Prophylaxis Prophylaxis in chess is the ability to anticipate your opponent’s strategy and block it before they execute it. Petrosian’s style wasn’t dramatic or aggressive, but it was extremely effective. He rarely lost. In much the same way, cybersecurity professionals must anticipate and neutralize risks before they evolve into threats. Unfortunately, the current state of information security remains largely reactive. A scan finds vulnerabilities; the team patches them. A penetration test reveals gaps; the team scrambles to close them. An a...
Comments
Post a Comment