top of page

Search


From Cloud Adoption to Cyber Resilience
The adoption of cloud technology has transformed how organizations manage their applications and infrastructure. Cloud computing offers...

Dr. Mike Bonnes
Dec 16, 20233 min read
Â
Â
Â
The Unleashed Growth of AI: Confronting the Challenges and Securing Our Future.
Our political leaders must acknowledge the real threat AI development poses and its impact on the world economies with its use and...

Dr. Mike Bonnes
Dec 15, 20233 min read
Â
Â
Â
A Thought Exercise Imagining a World Where AI "Feels"
Imagine waking up in a world where your coffee machine doesn't just brew your favorite espresso—it hums a happy tune, seemingly "in a...

Dr. Mike Bonnes
Dec 15, 20232 min read
Â
Â
Â
Security Moral of the Story
The story of Bob and Bubba from the early days of humanity illustrates a fundamental human tendency – the belief that "it won't happen to...

Dr. Mike Bonnes
Dec 15, 20232 min read
Â
Â
Â
Business Risk Appetite and Sales
How do you get your product or service through a company that has an extensive RFP process because of a risk aversion business model?...

Dr. Mike Bonnes
Dec 15, 20233 min read
Â
Â
Â
The Possible Future Story Battling AI's
Hold on to your firewalls and buckle up your encryption keys because we're diving into a not-so-distant future where cyber warfare has...

Dr. Mike Bonnes
Dec 15, 20238 min read
Â
Â
Â
Measuring Reputational Risk
An organization's reputation is part of its intangible assets, which include brand, human capital, goodwill, and knowledge base....

Dr. Mike Bonnes
Dec 15, 20235 min read
Â
Â
Â
FTC, the other Cyber security Governing body for Health care
Many organizations have implemented a HIPAA risk assessment and a well-defined privacy and security plan, meeting all the criteria of the...

Dr. Mike Bonnes
Dec 15, 20232 min read
Â
Â
Â
Does your company ensure that information provided by customers remains private?
In today's digital age, customer data is a valuable asset that requires the utmost protection. While 77 percent of organizations claim to...

Dr. Mike Bonnes
Dec 15, 20232 min read
Â
Â
Â
Define Chaos in Cyber Risk Valuations
A few years ago, I embarked on a fascinating research journey aimed at removing subjectivity from risk assessment by applying chaos...

Dr. Mike Bonnes
Dec 15, 20233 min read
Â
Â
Â
Data Privacy and Human Rights in the US
In the time of personal data propagation, every interaction, search, and click is chronicled. With the advent of machine learning and...

Dr. Mike Bonnes
Dec 15, 20235 min read
Â
Â
Â
Data Breach, Security Culture, and Your Customers
Large and small companies should consider this article when developing their security budgets and culture. Here are some stats to think...

Dr. Mike Bonnes
Dec 15, 20234 min read
Â
Â
Â
A Cautionary Tale: The Unraveling of Mediaville
This is the story of a fictional character with a genuine issue. Let’s introduce our character, Ethan Blackwood, a passionate believer in...

Dr. Mike Bonnes
Dec 15, 20235 min read
Â
Â
Â
Assessing Unreasonable Risk In Politics
Our feelings are influenced by culture, our experiences and those of people close to us, media coverage, and emotional feelings of dread...

Dr. Mike Bonnes
Dec 15, 20231 min read
Â
Â
Â
Apple Watch is trending towards full-body sensor networks.
The new Apple watch, recently introduced to the public, began with a simple marketing campaign. On Apple's website, they state, "To make...

Dr. Mike Bonnes
Dec 15, 20233 min read
Â
Â
Â


Open letter for our representatives on Digital Privacy and Human Rights Act
In today’s world and the future our digital identity often carries as much weight as our physical presence, the protection of personal...

Dr. Mike Bonnes
Oct 30, 20233 min read
Â
Â
Â


Data Protection and Echo Chambers
We are in the digitally interconnected age, the assumption might be that our exposure to diverse opinions and perspectives would...

Dr. Mike Bonnes
Oct 30, 20233 min read
Â
Â
Â


Digital privacy and Human rights an urgent call for constitutional clarity on privacy rights
In the time of personal data propagation, every interaction, search, and click is chronicled. With the advent of machine learning and...

Dr. Mike Bonnes
Oct 30, 20234 min read
Â
Â
Â
Self-Serve DevOps in the cloud
Why would a Cybersecurity Professional want to talk about self-serve DevOps, well I have had the opportunity and disadvantage to have...

Dr. Mike Bonnes
Oct 29, 20182 min read
Â
Â
Â
Self-Serve DevOps in the cloud
Why would a Cybersecurity Professional want to talk about self-serve DevOps, well I have had the opportunity and disadvantage to have...

Dr. Mike Bonnes
Oct 29, 20182 min read
Â
Â
Â
bottom of page


