Been using UNIX since the late 80s; Linux since the mid-90s; virtualization since the early 2000s and spent the past few years working in the cloud space.
Location
Alexandria, VA, USA
Education
B.S. Psychology from Pennsylvania State University
If that sounds like boring, old, regular security, you’re correct! Cybersecurity isn’t about finding some magic spell that makes your fruit maximally secure. It’s about making your fruit more secure than the fruit next to you. You do this by employing some thoughtful habits, in much the same way as you learned to lock your front door to guard against fruit-snatching robots.
Reminds me of the hungry bear/lion/etc. analogy: I don't need to run faster than the bear that's chasing us down, I just need to be able to run faster than you.
Been using UNIX since the late 80s; Linux since the mid-90s; virtualization since the early 2000s and spent the past few years working in the cloud space.
Location
Alexandria, VA, USA
Education
B.S. Psychology from Pennsylvania State University
This:
Reminds me of the hungry bear/lion/etc. analogy: I don't need to run faster than the bear that's chasing us down, I just need to be able to run faster than you.
I don’t know about you, but I think the fruit-snatching robot analogy is a whole lot cuter than bear mauling.
Unless you're a diabetic having an insulin-reaction and can't find your fruit. :p