Posts in Chuck Brooks
5 Cybersecurity Priorities for The Trump Administration

President Donald Trump’s administration will assume a cybersecurity portfolio that has continued to evolve toward combating digital threats since the Cybersecurity and Infrastructure Protection Agency (CISA) was created 6 years ago out of the Department of Homeland Security (DHS). CISA’s mission is a formidable one. The list of hostile threat players in cyberspace is quite extensive. Nation-states, organized criminals, terrorists, and hacktivists are all included.

Read More
Alarming Cybersecurity Stats: What You Need To Know In 2024

There is no doubt that 2023 was a tough year for cyber security. The amount of data breaches keeps rising from previous years, which was already very scary. An exponential rise in the complexity and intensity of cyberattacks like social engineering, ransomware, and DDOS attacks was also seen. This was mostly made possible by hackers using AI tools.

Read More
Computational Capabilities That Will Transform the World

Whether it be through our PCs or the smart devices we carry around, computing controls almost everything we do in the modern world. Futurists view computational power and related capacities as key indicators of technological advancement. The computational explosion of data will have a direct impact on the fundamental pillars of society, such as healthcare, security, communications, transportation, and energy.

Read More
Artificial Intelligence, Quantum Computing, and Space are 3 Tech areas to Watch in 2024

Every new year creates a new opportunity for optimism and predictions. In the past couple of years, emerging technology has permeated almost all areas of our lives. There is much to explore! In this article, I focus on three evolving technology areas that are already impacting our future but are only at the early stages of true potential: artificial intelligence, quantum computing, and space systems.

Read More
6 Cyber-Threat Areas for Companies and Organizations to Prioritize

Our evolving digital world is getting trickier and trickier to protect. Every organization is now a target in the present digital environment, and every firm, big or little, has operations, a brand, a reputation, and revenue funnels that could be at significant danger from a breach.

Read More
A Primer On Artificial Intelligence And Cybersecurity

The topic of artificial intelligence's rising involvement in our digital world and its associated opportunities and challenges have been the main topics of discussion at many security conferences and events in recent times. There is little doubt that humankind is on the verge of an era of exponential technological advancement, and AI is leading the way in the emerging digital world.

Read More
Quantum Tech Needed To Secure Critical Data From Quantum Decryption

In 2021, Booz Allen Hamilton analysts surmised that China will surpass Europe and the US in quantum-related research and development and that Chinese hackers could soon target heavily encrypted datasets such as weapon designs or details of undercover intelligence officers with a view to unlocking them at a later date when quantum computing makes decryption possible.

Read More
Cybersecurity Trends & Statistics For 2023; What You Need To Know

More Treachery And Risk Ahead As Attack Surface And Hacker Capabilities Grow

Every year I peruse emerging statistics and trends in cybersecurity and provide some perspective and analysis on the potential implications for industry and government from the data. While cybersecurity capabilities and awareness seem to be improving, unfortunately the threat and sophistication of cyber-attacks are matching that progress.

Read More
3 Alarming Threats To The U.S. Energy Grid – Cyber, Physical, And Existential Events

Protecting critical infrastructure, and especially the U.S. Energy Grid is certainly a topic that keeps the U.S. Department of Homeland Security (DHS), The U.S. Department of Energy (DOE), The U.S. Department of Defense (DOD), and U.S. intelligence community planners up at night. The threats can be from cybersecurity attacks (by countries, criminal gangs, or hacktivists), from physical attacks by terrorists (domestic or foreign) and vandals on utilities or power plants, or from an Electronic Magnetic Pulse (EMP) generated from a geomagnetic solar flare, or from a terrorist short range missile exploded in the atmosphere.

Read More
3 Key Areas Where Nanotechnology Is Impacting Our Future

We are living amid a technological revolution that is transforming the globe. Changes are visible in all aspects of our lives from transportation, health, and communications. As the adage states, yesterday’s science fiction is today’s science. We are now expanding our capabilities in every area of science, chemistry, biology, physics, and engineering. That includes heightened spae exploration, as well as building smart cities, new manufacturing hubs, and developing artificial intelligence and quantum technologies.

Read More
Welcome To 2032: A Merged Physical/Digital World

By 2032, it will be logical to assume that the world will be amid a digital and physical transformation beyond our expectations. It is no exaggeration to say we are on the cusp of scientific and technological advancements that will change how we live and interact.

What should we expect in the coming decade as we begin 2022? While there are many potential paradigms changing technological influences that will impact the future, let us explore three specific categories of future transformation: cognitive computing, health and medicine, and autonomous everything.

Read More
The Urgency To Cyber-Secure Space Assets

According to CISA, “the working group will serve as an important mechanism to improve the security and resilience of commercial space systems. It will identify and offer solutions to areas that need improvement in both the government and private sectors and will develop recommendations to effectively manage risk to space based assets and critical functions.” See CISA Launches a Space Systems Critical Infrastructure Working Group | CISA

Read More
The Security Challenge Of Protecting Smart Cities

As we continue to move forward in the Industry 4.0 era of greater connectivity between the physical and digital, the promise and development of smart cities become a more likely vision. While the term may have differing definitions, the term “smart city” usually connotes creating a public/private infrastructure to orchestrate the integration of transportation, energy, water resources, waste collections, smart-building technologies, and security technologies and services in a central location.

Read More
Alarming Cyber Statistics For Mid-Year 2022 That You Need To Know

A couple of times per year, I take a deep dive on writing about the newly reported cybersecurity statistics and trends that are impacting the digital landscape. Unfortunately, despite global efforts, every subsequent year the numbers get worse and show that we are far from being able to mitigate and contain the numerous cyber-threats targeting both industry and government.

Read More
Cybersecurity in 2022 – A Fresh Look at Some Very Alarming Stats

Last year I wrote two FORBES articles* that highlighted some of the more significant cyber statistics associated with our expanding digital ecosystem. In retrospect, 2021 was a very trying year for cybersecurity in so many areas. There were high profile breaches such as Solar Winds, Colonial Pipeline and dozens of others that had major economic and security related impact. Ransomware came on with a vengeance targeting many small and medium businesses. Perhaps most worrisome was how critical infrastructure and supply chain security weaknesses were targeted and exploited by adversaries at higher rates than in the past.

Read More
Public Private Partnerships And The Cybersecurity Challenge Of Protecting Critical Infrastructure

In the U.S., most of the critical infrastructure, including defense, oil and gas, electric power grids, health care, utilities, communications, transportation, education, banking and finance, is owned by the private sector (about 85 percent according to DHS) and regulated by the public sector. The public and private relationship in operating and protecting critical infrastructure requires a strong working partnership.

Protecting the critical infrastructure poses a difficult challenge because democratic societies by their nature are interactive, open and accessible. Because of the growing digital connectivity (and interdependence) of both IT and industrial control systems, critical infrastructure is facing an evolving and sophisticated array of cybersecurity challenges.

Read More
Catalyzing Innovation via Centers, Labs, and Foundries

The cornerstone of collaboration is based on knowledge transfer; sharing of research tools, methodologies and findings; and sometimes combining mutual funding resources to meet shortfalls necessary to build prototypes and commercialize technologies.

Collaborations often involve combinations of government, industry and academia who work together to meet difficult challenges and cultivate new ideas. A growing trend for many leading companies is creating technology specific innovation centers, labs, and foundries to accelerate collaboration and invention.

Read More
A Scoville Heat Scale For Measuring Cybersecurity

The Scoville Scale is a measurement chart used to rate the heat of peppers or other spicy foods. It can also can have a useful application for measuring cybersecurity threats. Cyber-threats are also red hot as the human attack surface is projected to reach over 6 billion people by 2022. In addition, cyber-crime damage costs are estimated to reach $6 trillion annually by 2021. The cybersecurity firm RiskIQ states that every minute approximately 1,861 people fall victim to cyber-attacks, while some $1.14 million is stolen. In recognition of these alarming stats, perhaps it would be useful to categorize cyber-threats in a similar scale to the hot peppers we consume. I have provided my own Scoville Scale-like heat characterizations of the cyber threats we are facing below.

Read More