ascohen2018 Reading ListAs we move into 2019, here is a list of what I read in 2018, a garden variety of social/political, fiction, and business tomes. Finished…Jan 1, 2019Jan 1, 2019
ascohenSI VIS AMARI, AMA* MY JOHN MCCAIN MEMORYWatching Meghan McCain’s emotional eulogy for her father this morning, I was mesmerized, like most of the nation, with this inspiring…Sep 1, 2018Sep 1, 2018
ascohenData Center Security Requires ParanoiaA whitelist model is a key strategy in today’s threat environment.Jul 25, 2016Jul 25, 2016
ascohenWhat Happens if the New Stack is Not a Stack at All?The technology world is going through the most significant revolution since client-server (i.e., PC, browser, web) overtook the mainframe…Jun 29, 2016Jun 29, 2016
ascohenHow to Survive the Era of the Hack: 5 Things Every Enterprise Should KnowCommentators called 2014 the “year of the hack.” Many companies (and individuals) were sorely pressed to counter a seemingly non-stop…Mar 7, 2015Mar 7, 2015
ascohenThe new 80–20 rule for data center cybersecurityFor much of the IT industry, 2014 was the year of the hack. Reporters and analysts investigated and wrote incessantly about the seemingly…Feb 18, 2015Feb 18, 2015
ascohenTo Boldly Go Where No Firewall Has Gone BeforeIn the classic opening to the original Star Trek series, William Shatner, playing the iconic Captain James T. Kirk, provides the now-famous…Jan 30, 2015Jan 30, 2015