You Laggards! Use MFA!

Multi-Factor Authentication (MFA) is a security process that requires users to provide more than one form of identification when logging into a system or accessing sensitive data. This can include something the user knows (like a password or security question), something the user has (like a smartphone or security token), or something the user isContinue reading “You Laggards! Use MFA!”

Average Managers vs. Good Managers vs. Leaders

                Marcus Buckingham, in his 2005 Harvard Business Review article “What Great Managers Do,” said that average managers play checkers, great managers play chess, and great leaders rally people around what is universal and capitalize on that (Buckingham, 2005).  As someone who prefers leadership to management, I agree with this sentiment.                 The average managerContinue reading “Average Managers vs. Good Managers vs. Leaders”

Why People Don’t Adopt Multifactor Authentication (MFA)

Some people are bullheaded. Some people are ignorant. There are several reasons why some people may not adopt multifactor authentication (MFA). Some of the most common reasons include: Overall, the adoption of MFA depends on a variety of factors, including the needs and preferences of the individual or organization, the availability and cost of MFAContinue reading “Why People Don’t Adopt Multifactor Authentication (MFA)”

Art in the SSE Forum Podcast

I ‘appeared’ (audio-only appearance) in the SSE Forum podcast with Jaye Tilson and John Spiegel regarding zero trust. Here’s Jaye’s LinkedIn post about that: https://www.linkedin.com/feed/update/urn:li:activity:7009191284678492161/ Here’s the SoundCloud for the podcast episode: https://soundcloud.com/sse-forum/ciso-visionaries-ft-art-ocain?si=5710958b55414259a529609e559c33ff&utm_source=clipboard&utm_medium=text&utm_campaign=social_sharing

Fitbit’s Approach to Agile

Introduction             Fitbit, a popular wearable fitness tracker brand, has embraced agile throughout its lifespan in order to bring fitness technology to consumers in order to improve their health with innovative and competitively-products (McNew, 2018).  At the top of its market, Fitbit creates purpose-built hardware and advanced software to deliver technologies like GPS, heart rateContinue reading Fitbit’s Approach to Agile

Danone’s Disruptive Technology

Introduction to Danone as a Disruptive Company             Danone is a food and water company with sustainability, regenerative agriculture, and human health as core values.  They are a B Corp (Danone North America – Certified B Corporation – B Lab Global, n.d.), and they are dedicated to the United Nation’s Sustainable Development Goals.  Danone wasContinue reading “Danone’s Disruptive Technology”

IoT and Big Data in Cybersecurity

IoT in Cybersecurity             In cybersecurity, operational technology (OT) and Internet of Things (IoT) devices create a risky threat surface to manage.  Companies often have thousands of IoT devices, from thermostats and HVAC units to lighting controls.  Each of these devices is accessible via the network.  They are often unpatched or unpatchable and may containContinue reading “IoT and Big Data in Cybersecurity”