Hello and welcome to my new blog, “Security Conundrum.” What is a conundrum and why did I choose this as the name of my blog? According to Merriam-Webster Dictionary, a conundrum is “an intricate and difficult problem.” If you listen to the news, you may think that cybersecurity is exactly that, a conundrum. However, is it really that difficult of a problem or could it be that the industry has been focusing on the symptoms of cybersecurity and not addressing the cause?
Many cybersecurity blogs, podcasts, and conferences discuss the issues related to cyber threats time and again, leaving the audience apprehensive about the future of technology. However, they rarely offer solutions to these problems. As a result, vendors use “Fear, Uncertainty and Doubt” also known as FUD to sell “solution” after “solution,” but the problems aren’t getting resolved.
Security Conundrum is going to take a different approach. Instead of discussing a broad topic such as weak passwords, which is known to be a major concern for over 20 years. We are going to take the conversation one step further by discussing what you can do to prevent the dangers associated with weak passwords using technical and non-technical solutions. The goal of this is to provide you with an option on how to address the root causes behind all these cybersecurity problems and hopefully give you a tool or process that will lower your cyber risk personally and/or professionally. Thank you for stopping by and I look forward to exploring the many cyber challenges we face on a regular basis.
Leave A Comment