• C4ISR2020 Vanguard
Spies Among Us: Are We Blind To Insider Threats?
Sep27

Spies Among Us: Are We Blind To Insider Threats?

Playing out almost daily, the world’s most impactful nations masterfully engage in various tactics, like sanctions, tariffs, and detainments, for the advancement of greater strategic goals. Like chess moves, they can be predictable and emerge from a well-worn political playbook and at other times they come out of the left-field, often leaving the opposing nation stuck between their agenda...

Read More
Artificial Intelligence: The Black Box Conundrum
Jul18

Artificial Intelligence: The Black Box Conundrum

The one thing guaranteed to make me laugh out loud is Boston Dynamics’ video of their robot-dog, SpotMini, slipping on a pile of banana peels. Another video of SpotMini’s “robustness test” shows an equally funny fail-point as a man armed with a hockey stick attempts to dissuade SpotMini from completing its task. He is flat out defeated. Even though...

Read More
Strong, Secure, Engaged: The Cyber Extract
Jun04

Strong, Secure, Engaged: The Cyber Extract

Lately, hardly a day goes by without media headlines stringing out the latest on the SNC Lavalin scandal with proliferous filler, like the Norman affair and China (anything to do with China). With the words ‘bribe,’ ‘breach’ and ‘bureaucrats behaving badly’ hanging over Canada’s woes, headlines were made around the world. Canada, no longer the apologetic neophyte, had slid...

Read More
The Perfect Cut-Out: When Global Politics, Espionage and Greed Converge with Technology
Mar07

The Perfect Cut-Out: When Global Politics, Espionage and Greed Converge with Technology

Fluid, agile and accessible – the malicious use of technology can range from simple, uncoordinated attacks to complex, highly coordinated persistence. Figuring as tool in the commission of a crime or as a delivery system to exploit many vectors, ‘technology for bad’ is not new, but what we have seen recently is – and it’s troubling. When mixed with...

Read More
Technology and Philosophy: An Exoteric View of Zero-Trust and Federated Identity
Feb26

Technology and Philosophy: An Exoteric View of Zero-Trust and Federated Identity

Whether it is a malicious attack or an inadvertent release on protected or classified data, a breach of government data can level a severe blow to integrity and reputation, leading to legal and legislative consequences that impact partners, allies and the public. For those reasons, cybersecurity and privacy practices for the protection of electronic information go hand-in-hand. The verification...

Read More
Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Youtube