Protecting the water supply – hacker edition
What can municipalities do to better protect their water supply systems?
Education: CISSP, RHCSA
Highlights of your career? Reverse engineering human brain patterns.
What malware do you hate the most? Nation state sponsored low and slow.
Favorite activities? Building and flying airplanes.
What is your golden rule for cyberspace? Stupid hurts.
When did you get your first computer and what kind was it? 1988, Radio Shack TRS-80.
Favorite computer game/activity? Java/Big Data algorithms to find brain patterns.
What can municipalities do to better protect their water supply systems?
Cameron CampYour ‘networked computer on wheels’ has a privacy problem – when it comes to your data, you may not really be in the driver’s seat
Cameron CampNew mesh Wi-Fi routers may be the answer to your wireless signal woes, but how about your privacy and security?
Cameron CampAs Election Day draws near, here's a snapshot of how this election cycle is faring in the hands of the would-be digitally meddlesome
Cameron CampWhy are connected medical devices vulnerable to attack and how likely are they to get hacked? Here are five digital chinks in the armor.
Cameron CampYou don’t need a degree in cybersecurity or a bottomless budget to do the security basics well – here are five things that will get you on the right track
Cameron CampIt’s easy to reset your password or PIN after a data breach. But reset your face? Not so much.
Cameron CampWith the big voting day rapidly approaching, can the security of the election still be shored up? If so, how?
Cameron CampAs work from home is the new norm in the coronavirus era, you’re probably thinking of enabling remote desktop connections for your off-site staff. Here’s how to do it securely.
Aryeh Goretsky and Cameron CampRemote work can be much safer with the right cyber‑hygiene practices in place – multi‑factor authentication is one of them
Cameron CampAs the COVID-19 pandemic has many organizations switching employees to remote work, a virtual private network is essential for countering the increased security risks
Cameron CampAnd how would you know if the algorithm was tampered with?
Cameron CampWhat the human battle against biological viruses can teach us about fighting computer infections – and vice versa
Cameron CampNo more default logins on new IoT devices if UK legislators get their way
Cameron CampAs software becomes more important than ever, how can engaging the security industry make the road ahead less winding?
Cameron CampNo one has a road map for securing a connected city – but there should be a whole atlas of such maps
Cameron CampSmart selections when starting small can ease the pain as you scale up your company’s privacy infrastructure
Cameron CampHow the field of play has changed and why endpoint protection still often comes down to doing the basics, even in the face of increasingly complex threats
Cameron CampAttention-grabbing cyberattacks that use fiendish exploits are probably not the kind of threat that should be your main concern – here's what your organization should focus on instead
Lysa Myers and Cameron CampAfter welcoming hacking research, automobile technology started to get better at defending against hacks. So why has the airline industry not been as welcoming?
Cameron Camp