Welcome to
A place to release your cyber-stress

All CyberToon strips

Mar 21

The CISO of Venice

 

There is no shame in being under a ransomware attack.

The inspiration for this Cybertoon is Act III, scene I of William Shakespeare’s, The Merchant of Venice “If you prick us, do we not bleed?..... if you poison us, do we not die?"

It is the notion of the inevitable consequence - people dealing with Information Technology are forced to pay ransomware to keep their business running. They are not careless, they are not wrong, they are not weak. They are just in dire straits. 

The silver lining is that new technology has presented itself that can tell you in one click if and how ransomware can hit you and what the “blast radius” would be if it does. There is hope in the form of PenTera by Pcysys. 

  

 

There is no shame in being under a ransomware attack.

The inspiration for this Cybertoon is Act III, scene I of William Shakespeare’s, The Merchant of Venice “If you prick us, do we not bleed?..... if you poison us, do we not die?"

It is the notion of the inevitable consequence - people dealing with Information Technology are forced to pay ransomware to keep their business running. They are not careless, they are not wrong, they are not weak. They are just in dire straits. 

The silver lining is that new technology has presented itself that can tell you in one click if and how ransomware can hit you and what the “blast radius” would be if it does. There is hope in the form of PenTera by Pcysys. 

  
Mar 3

Parents' Day Heroes

First responders, essential workers, and soldiers are all guardians of our social fabric and way of life. They deserve our admiration and recognition for serving and protecting our well-being. 

What is rapidly changing are the threats to our digital life and digitally-controlled infrastructure. If it’s digital, it’s cyber-vulnerable! We’ve already seen the regretful loss of life in hospitals that couldn’t serve critical ER patients because they were ransomware-paralyzed. The costs of being caught off-guard are higher than ever.

We think that nowadays cyber and information security workers deserve more of our appreciation for their sacrifice of being there for our businesses and governments, engaged in a form of cyber warfare, working day and night to keep our business and street lights on. 

Respect.

  

First responders, essential workers, and soldiers are all guardians of our social fabric and way of life. They deserve our admiration and recognition for serving and protecting our well-being. 

What is rapidly changing are the threats to our digital life and digitally-controlled infrastructure. If it’s digital, it’s cyber-vulnerable! We’ve already seen the regretful loss of life in hospitals that couldn’t serve critical ER patients because they were ransomware-paralyzed. The costs of being caught off-guard are higher than ever.

We think that nowadays cyber and information security workers deserve more of our appreciation for their sacrifice of being there for our businesses and governments, engaged in a form of cyber warfare, working day and night to keep our business and street lights on. 

Respect.

  
Feb 14

The Cyber Gambit

One common aspect for chess and cyber “ethical hacking” (aka Penetration Testing) is a degree of mastership. Becoming a chess grandmaster takes years of practice, to play against the best and win against the best.

However - while the “move space” on an 8x8 chessboard and six types of pieces count millions of combinations, the hacking “move space” over an enterprise’s attack surface for an average hacker is 10 orders of magnitude larger.

To overcome this challenge in every enterprise in the world requires using something that can play like a chess player over 100,000 boards concurrently. 

It’s the Era of Automated Pen-testing.

  

One common aspect for chess and cyber “ethical hacking” (aka Penetration Testing) is a degree of mastership. Becoming a chess grandmaster takes years of practice, to play against the best and win against the best.

However - while the “move space” on an 8x8 chessboard and six types of pieces count millions of combinations, the hacking “move space” over an enterprise’s attack surface for an average hacker is 10 orders of magnitude larger.

To overcome this challenge in every enterprise in the world requires using something that can play like a chess player over 100,000 boards concurrently. 

It’s the Era of Automated Pen-testing.