Tag

zero trust security

Explore zero trust security principles, architecture, and implementation strategies. Our articles cover identity verification, least-privilege access, micro-segmentation, and how organizations can adopt a never-trust-always-verify approach to protect networks, data, and users from internal and external threats.

posts

cybersecurity

Cybersecurity in 2021: What Actually Works Right Now

The Colonial Pipeline Attack Changed Everything On May 7, 2021, a single compromised password shut down the largest fuel pipeline in the United States. Colonial Pipeline paid a $4.4 million ransom to the DarkSide threat actor group — and Americans along the East Coast panic-bought gasoline for days. That'

Carl B. Johnson Jul 01, 2021 7 min read
computer security

Computer Security in 2021: What Actually Works Now

The Colonial Pipeline Hack Changed the Conversation On May 7, 2021, a single compromised password shut down the largest fuel pipeline in the United States. Colonial Pipeline paid a $4.4 million ransom in Bitcoin to the DarkSide ransomware group. Gas stations across the Southeast ran dry. Panic buying erupted.

Carl B. Johnson Jun 03, 2021 7 min read
cyber security

Cyber Security Basics That Actually Stop Breaches

The Colonial Pipeline Hack Was a Wake-Up Call Nobody Should Have Needed On May 7, 2021, a single compromised password shut down the largest fuel pipeline in the United States. Colonial Pipeline paid a $4.4 million ransom to the DarkSide threat actor group, and fuel shortages rippled across the

Carl B. Johnson Jun 01, 2021 6 min read
computer security software

Computer Security Software: What Actually Stops Breaches

The Colonial Pipeline Just Proved Your Software Isn't Enough On May 7, 2021, a single compromised password shut down the largest fuel pipeline in the United States. Colonial Pipeline's systems went dark, gasoline shortages spread across the Southeast, and a ransomware gang called DarkSide walked away

Carl B. Johnson May 18, 2021 6 min read
CISA cybersecurity guidelines

CISA Cybersecurity Guidelines: What Actually Matters

In January 2024, CISA itself disclosed that a threat actor had exploited vulnerabilities in Ivanti products to breach two of its own systems. Let that sink in. The federal agency responsible for setting cybersecurity standards for the entire nation got hit. If that doesn't convince you that simply

Carl B. Johnson Sep 14, 2019 7 min read
cyber security

Cyber Security in 2026: What Actually Works Now

In March 2024, Change Healthcare suffered a ransomware attack that disrupted insurance claims processing for nearly every hospital and pharmacy in the United States. The root cause? Stolen credentials on a system without multi-factor authentication. One overlooked gap in cyber security brought a $32 billion company to its knees and

Carl B. Johnson Feb 25, 2019 6 min read
computer security

Computer Security in 2026: What Actually Works Now

The Breach That Changed How I Think About Computer Security In early 2024, Change Healthcare — one of the largest health payment processors in the United States — got hit with a ransomware attack that disrupted pharmacy operations, delayed patient care, and exposed the protected health information of roughly 100 million individuals.

Carl B. Johnson Feb 25, 2019 7 min read
computer security security

Computer Security Security: Why One Layer Is Never Enough

The Breach That Proved "Secure Enough" Is a Myth In 2023, MGM Resorts lost an estimated $100 million after a social engineering phone call — just one phone call — gave threat actors the foothold they needed. MGM had firewalls. They had endpoint protection. They had a security team. What

Carl B. Johnson Feb 22, 2019 7 min read