Control Systems. Are they possibly the biggest security vulnerability? By now almost everyone has seen the news media on the cyberattacks stemming from Russia. So far nothing dastardly has occurred at the same scale of the Colonial Pipeline fiasco in 2021. That event involved the deployment of ransomware across the corporate network. As a precaution,…
Ukraine – Poland 1939 All Over Again
The strange resemblance between Ukraine in 2022 and Poland in 1939. An historical perspective on the Russian invasion of Ukraine.
The Case of Lorie Smith
Can a web designer be compelled to create content?
Transformation — From Reaction to Revolution
How do you move from resistance to revolution? The colonists had to address some serious issues before taking that step.
Welcome to DOGland
When I was first hired by the US Forest Service, the first acronym I had to figure out was “DOG”, short for Daily Operations Guide. Large enterprises use DOGs to bring consistency in knowledge, training and operations.