Thoughts on Technology
GPL CC Licensed, Attribution Required (except where marked otherwise)
All are opinions and thoughts by Jeremy Pickett, attributions in documents
Thoughts on Technology
GPL CC Licensed, Attribution Required (except where marked otherwise)
All are opinions and thoughts by Jeremy Pickett, attributions in documents
08/04/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.01
"Catching Hackers Traversing Internal Networks: A Treatise on Lateral Movement Detection" is a comprehensive exploration of the evolution of lateral movement in cybersecurity threats. The report underscores how lateral movement, where cybercriminals move across networks post initial access, has become an integral part of the advanced threat actors' playbook. While organizations have bolstered their defense against external threats, lateral movement continues to provide a stealthy route for threat actors, offering them the potential to inflict maximum damage. The report also considers the ethical implications from the perspective of security professionals in deploying defenses against such movement.
The evolving role of the CISO - Strategic advisor, integrator and visionary leader
08/04/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.01
The Chief Information Security Officer's (CISO) role has experienced a transformative evolution over time. Originally tasked with technical duties like maintaining firewalls and antivirus software, their role has significantly broadened in recent years due to the increasing complexity of digital technologies and growing sophistication of cyber threats. Nowadays, CISOs are expected to function as strategic drivers, guiding top-tier decisions within the organization by translating technical security concerns into business implications. This expanded role necessitates they become adept communicators, liaising with executives, board members, and shareholders to promote security measures and investments.
Cybersecurity’s role in ESG (environmental, social and governance) metrics
08/04/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.01
The piece explores how cybersecurity plays a critical role in enhancing Environmental, Social, and Governance (ESG) metrics, which measure a company's commitment to environmental conservation, social improvement, and ethical governance. It suggests that cybersecurity's potential goes beyond safeguarding data and systems, instead contributing to societal outcomes and community well-being. This intersection with ESG metrics provides an opportunity for Chief Information Security Officers (CISOs) to align their security practices with broader social and environmental goals.
Navigating Cyber Risks During Times of Business Transition
08/03/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.01
The essay underscores the necessity for a strong focus on cybersecurity during periods of organizational transition, such as mergers, acquisitions, or divestitures. It stresses that the Chief Information Security Officers (CISOs) play a crucial role in this period, evaluating potential vulnerabilities and threats, and implementing robust continuity plans to maintain operations and data security throughout the restructuring process.
Managing Third-Party Cyber Risks Across The Extended Supply Chain
08/02/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.01
The essay discusses the escalating cybersecurity risks that arise from an organization's interactions with third parties such as contractors, managed service providers, and SaaS applications. Historically, companies have focused on fortifying their proprietary infrastructures but, as shown through examples like the 2014 JPMorgan Chase breach and the SolarWinds hack, vulnerabilities in third-party services can lead to significant cyber incidents.
Cybersecurity and the Hippocratic Oath
08/01/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.01
It feels like a profession such as Cybersecurity should be governed by a set of principles and oaths that lead to obvious truths and governing actions. That would be a very nice thing indeed. However many lines of thought do not appear to substantiate that premise, so a bit more care must be taken. What is cybersecurity, what is an oath like the Hippocratic Oath, and how would it apply to Cybersecurity?
Cyberbiohacking: The Next Security Frontier?
08/01/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.01
The potential of synthetic biology is vast, promising breakthroughs from curing genetic diseases, to biofuel production, to sustainable agriculture. However, the potential for misuse or unintended consequences also looms large, in ways that could threaten our physical, cyber, and mental security.
How Cryptocurrency Empowers Activists Worldwide
7/31/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.01
Cryptocurrencies like Bitcoin and privacy coins provide crucial financial tools for pro-democracy dissidents and journalists operating under authoritarian regimes, improving on immense historical challenges. However, risks remain and a thoughtful approach combating tyranny while encouraging discourse is still needed.
Who should build our AI Guardians?
7/31/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.01
As AI systems grow more powerful, especially in security contexts, we must thoughtfully debate whether self-regulation or government oversight is the best approach for guiding their ethical development. Though there are merits to both, ultimately a hybrid approach may prove most prudent.
The Cyber Risks of Brain-Computer Interface Implants
7/31/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.01
The promises of the technology, especially being adjacent to many complementary innovations which are currently changing the technology landscape, are the stuff of science fiction. And it appears that even with delays, progress is being made. However, similar to other technologies, we should be wary of overpromises and under-delivering. The technology, regulatory environment, ethical concerns, and lack of concrete historical precedent many of the specifics do not seem to be well understood.
Nuclear Command and Control Meets AI: Should We Be Scared?
7/30/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.01
This article attempts to describe the consequences of different types and strategies of defensive deterrence, unintended consequences, how they have been described in art, and how art has been a mirror held up to real-life scenarios. It continues by examining policies, ethics, and responsibilities in the real world which influence strategies we may take putting AI into the critical path of some of the most consequential decisions mankind can make.
Digital Yuan and Bitcoin, Will One Replace the Other?
7/30/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.01
China has taken a range of approaches to digital currencies - promoting the centralized digital yuan while cracking down on decentralized cryptocurrencies like Bitcoin. Tensions remain between state interests and cryptocurrency ideology. While China is unlikely to fully displace Bitcoin's decentralized nature, its global economic influence and policy actions could significantly shape cryptocurrency development and adoption trends worldwide.
First Amendment, Free Speech Online
7/30/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.01
Delineating proper boundaries between free speech, censorship, and consequences remains a profound ongoing challenge as social technology reshapes discourse incentives, harms, and protections. Online speech issues sit at the crux of law, ethics, technology and democracy. With wisdom and diligence, solutions balancing rights, responsibilities and evolving digital realities remain possible.
Cyber Espionage, When is it Right?
7/30/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.01
Information gathering about potential adversaries has occurred throughout history. Early recorded examples include ancient Egyptian hieroglyphics discussing espionage against the Hittites. Sun Tzu's The Art of War highlighted intelligence gathering in warfare. Such practices continued into modern eras with spying playing a role in conflicts like the Revolutionary War and World War II.
AUTHOR'S OPINION AND BIAS: The author of this piece has attempted to write a fair and accurate report on the state of Espionage as conducted by nation-states against adversaries and in some cases their own citizens. Information has been pulled from public sources. It should be known that the author uses a myriad of assistants to accelerate the writing process, and it likely does not come as a shock to many, but sources that have been published publicly in the New York Times, Washington Post, Associated Press, and many other establishments are omitted from many current popular Large Language models. The author knows this because he has read them.
An informed public primarily from the Fourth Estate is essential to a functioning democracy. The author believes the suppression of public news about public events is detrimental to an informed discussion.
CALL TO ACTION: Please let companies like OpenAI, Anthropic, Microsoft, Associated Press, the New York Times, the Washington Post, and others know that you prefer open and honest discussions. And politely let political leaders know that you support discussion in furtherance of an informed democracy. Forward this free, open-source article to those who may need to read it. Thank you. - Jeremy Pickett, July 30th, 2023
The Most Severe Punishment for Cybercrime
7/29/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.01
Virtual harms challenge society to re-examine old assumptions about crime and punishment. Does lifelong incarceration balancedly address cyber wrongs lacking bloodshed but severely threatening infrastructure or prosperity? Exploring this complex question requires revisiting justice principles and precedents for non-homicide offenses.
Quantum Computing, Cryptocurrency
7/29/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.01
The emergence of practical quantum computers capable of running algorithms like Shor's to break common public-key encryption schemes poses an existential threat to cryptography securing technologies from blockchain to the internet; to navigate this transition and guard against quantum attacks, experts recommend migrating digital systems to next-generation post-quantum cryptographic standards designed to remain secure even in the era of quantum computing.
7/27/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.01
Balancing whistleblower protections against risks of damaging leaks presents complex ethical and legal tradeoffs for technology issues involving classified systems, proprietary IP, public-private data sharing necessitating secrecy, and cybersecurity contexts lacking well-defined laws.
Nation States, Digital Geneva
7/27/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.01
Digital warfare is increasingly blurring the lines between actions taken digitally and those in real life. Do we need to take lessons learned by centuries of conflict and apply them wholesale, or is a more subtle approach appropriate?
Demystifying Defense and the Dark Net
7/27/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.02 OUTLINE
In this vast and varied landscape, Blue Teams must navigate with care. The dark net is a double-edged sword, offering valuable intelligence but also presenting significant risks. It's a place where the line between legality and illegality, ethical and unethical, can often blur. But with the right approach, Blue Teams can leverage The dark net as a powerful tool in their cybersecurity arsenal, turning the shadows into a source of illumination.
This edition is considered an OUTLINE. While it contains 250 pages of insights and critical analysis, it is a living document not unlike a Wiki. Please help contribute to sections, especially the massive Section IV. This section attempts to bridge the divide between Blue teams and groups that may have been considered adversaries in the past. However due to ethical and philosophical understanding, may need reclassification.
How AI Is Reshaping Cyber Crime And Policing
7/27/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.01
Interfacing with Law Enforcement can be a time consuming, confusing process. This long form article aims to dispel some of the hesitancy in reporting online cybercrime correctly, both in traditional sense and with the aid of an AI assistant.
How Private are your Privacy Coins?
7/27/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.01
Cryptocurrencies record public transaction histories, prompting privacy concerns. This led to "privacy coins" like Monero and Zcash using cryptography to hide transaction details, balancing financial privacy against transparency for law enforcement. Understanding cryptocurrency privacy requires examining both technical implementations and ethical nuances.
Autonomous Weapons Systems (Concise Read)
7/27/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.01
Should Ransomware Payments be Illegal? (Concise Read)
7/27/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.01
AI and the Grid (Concise Read)
7/27/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.01
Mitigating Compliance Risk in the Age of Big Data
7/21/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.02
Introduction
Big data has become the new currency of the modern world. It's a treasure trove of insights that fuel breakthroughs and guide decision-making in nearly every industry, from healthcare and finance to retail and entertainment. The philosophical impetus behind the adoption of big data lies in its immense potential to provide an understanding of complex phenomena in a way that was previously unattainable. By processing vast volumes of data, we can unveil patterns, correlations, and trends that allow for smarter strategies, predictive modeling, and personalized experiences. Moreover, the move to big data embodies our quest for knowledge and our innate human drive to uncover truth, and it is a logical progression in our quest to leverage technology to improve human life.
However, as the proverbial saying goes, with great power comes great responsibility.
Continous Monitoring and Blue Teams
7/21/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.02
Introduction
Continuous monitoring has become essential for robust cybersecurity in today's threat landscape. As attacks grow more frequent and sophisticated, organizations can no longer rely on periodic audits and point-in-time compliance checks. They need ongoing visibility into their environments to detect threats early and respond quickly.
The Rise of AI in InfoSec, '23/'24
7/20/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.02
Introduction
Information security has become a top priority for organizations as data breaches and cyber attacks continue to rise. Artificial intelligence (AI) is emerging as a potentially game-changing tool for bolstering information security in the coming years. This article will examine the growing role of AI in key areas of information security including threat detection, incident response, insider threats, and data protection.
Top Tools for Ethical Hacking, '23 Edition
7/20/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.02
Introduction
Ethical hacking, also known as penetration testing or white-hat hacking, has become an indispensable practice for organizations in the modern digital landscape. It involves the proactive identification of potential vulnerabilities in a system that could be exploited by malicious actors, with the aim of rectifying these weaknesses before they can be used for nefarious purposes. As the complexity and sophistication of cyber threats continue to escalate, ethical hackers are compelled to constantly update and diversify their toolkits to stay ahead of the curve. This comprehensive article delves into 18 of the most effective open-source and commercial tools that ethical hackers should consider incorporating into their arsenal in 2023. These tools are categorized into three main areas: reconnaissance, vulnerability assessment, and exploitation.
Strengthening the Human Firewall with GRC
7/19/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 0.02
Introduction
GRC refers to an integrated, holistic approach for managing information security, spanning people, processes and technology. It provides the governance and structure for implementing effective security policies, controls, and awareness programs. Some key elements of a GRC program include:
Risk assessments - Identifying potential threats, vulnerabilities, and risk scenarios through activities like threat modeling, audits, and penetration testing. This informs the policies and controls needed.
Policies and standards - Organization-wide policies establishing security baselines, acceptable use, access controls, incident response etc. Standards may specify technologies and controls to implement.
Training and awareness - Educating employees on security policies, how to spot threats like phishing, and their role as human firewalls. Training should be role-based, ongoing, and cover emerging threats.
Read Strengthening the Human Firewall ...
Threat Intelligence, Red/Blue Teams
7/18/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 1.0
Introduction
In the sprawling landscape of modern cybersecurity, the roles of offense and defense have never been more critical. Blue Teams, the guardians of our digital infrastructure, and Red Teams, the ethical hackers probing for vulnerabilities, are locked in an ongoing game of cat and mouse. Their arsenal? Threat Intelligence (TI), a critical tool that offers a deeper understanding of the tactics, techniques, and procedures employed by cyber adversaries. Yet, the vast array of TI sources often raises the question: should one rely on Open Source Intelligence (OSINT) or invest in commercial threat intelligence platforms?
7/17/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 1.0
Introduction
In this article, many of the use cases or examples are viewed through the lens of a fictional software company named DemoCompanyInc. For these examples, this company has the following departments: development, test, sales, marketing, information technology, information security, human resources, and executive leadership. This is so examples may be more closely grounded to reality as opposed to purely theoretical.
In the age of digital transformation, companies are continually seeking novel approaches to fortify their cybersecurity infrastructure. As cyber threats continue to evolve, traditional security measures alone are insufficient to protect sensitive data and maintain integrity in the digital landscape. An emerging solution lies at the intersection of artificial intelligence (AI) and ethical hacking: Machine Learning.
7/17/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett
Version 1.0
Introduction
In the intricate and convoluted digital tapestry of our modern era, the security of sensitive data and its protection against unauthorized access is of the utmost importance. As we navigate this vast and complex digital matrix, Role-Based Access Control (RBAC) emerges as a pivotal strategy to fortify data privacy and security (Microsoft Azure).
When examples are useful, we will refer to them through the lens of a fake software development startup named DemoCompanyInc.
7/16/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett (Twitter)
Version 1.0
Introduction
In our rapidly changing digital era, technological advancements are at the forefront of societal progression. New platforms and technologies, from cloud computing and Internet of Things (IoT) to artificial intelligence and machine learning, continually emerge and evolve. While these developments offer unprecedented opportunities for innovation, they also present new avenues for potential security threats. [What is Ethical Hacking? | EC-Council Official Blog]
7/16/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett (Twitter)
Version 1.0
Introduction
As we navigate through a digital age where cybersecurity threats are not just commonplace but increasingly sophisticated and destructive, the relevance and importance of security exposure databases and IP reputation services are rapidly growing. These platforms serve as vital arsenals in our fight against cyber threats, cataloging potential vulnerabilities and risks, and equipping organizations with the knowledge and tools to strengthen their defense mechanisms.
7/16/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett (Twitter)
Version 1.0
Introduction
In the modern digital landscape, vulnerability management is critical for any organization. Regularly scanning for weaknesses in your IT infrastructure and addressing them before they're exploited is a necessity. With many products on the market, we're diving into the pros, cons, and estimated costs of the top three cloud-based vulnerability management products.
7/16/2023 by Jeremy Pickett :: Become a Patron
Buy Me a Coffee (small tip) :: @jeremy_pickett (Twitter)
Version 1.0
Introduction
Security is at the forefront of modern business needs, with organizations large and small transitioning their operations to the cloud. A significant part of this digital evolution involves adopting robust cloud-based firewall solutions. We've analyzed three of the most popular cloud-based firewall products and their pros and cons to help you make an informed decision. Let's take a closer look.
Content creation is assisted by my exceptional assistants, ChatGPT 4.0 whom I sarcastically have named Jeeves and I insist on being addressed as Bertie Wooster. Thank you Wodehouse, Stephen Fry, and Hugh Laurie.