top of page
Systems • Identity • Trust
Human Factors
SITH
2
All Posts


APIs: The Control Points Hiding Inside Every App
Modern applications feel instant and seamless, but that experience is not magic. Behind the scenes, a complex coordination happens, powered by APIs. These interfaces connect different parts of software, allowing them to work together smoothly without exposing their inner workings. Understanding how APIs function and why they matter is key to building fast, secure, and scalable apps. What Is an API and Why It Matters An API, or Application Programming Interface, is a documente
Rich Greene
3 days ago3 min read


Securing AI at Work: What the Chat Box Actually Touches
Artificial intelligence chat boxes have become common tools in workplaces, but they are far from simple toys. Behind their casual interfaces, these AI assistants act as powerful data pipelines. They collect context, combine knowledge, and generate outputs that influence real decisions and actions. This makes securing AI at work a critical challenge that many teams overlook. Understanding what the AI chat box actually touches is the first step to controlling risks. It reads em
Rich Greene
3 days ago4 min read


AI Is an Umbrella Word (And That's the Problem)
Every company claims to use AI today. But what do they really mean? Sometimes it’s simple prediction. Other times it’s chatbots or just old statistics with a new label. The term AI covers a wide range of techniques that let computers perform tasks once needing human judgment. This broad use of the word creates confusion about risks, value, and what to expect. Naming the parts clearly helps cut through the noise. What AI Really Means AI is not a single technology but a collect
Rich Greene
3 days ago2 min read


Why Security Fails When Everyone Is Right
Security rarely breaks because someone acted recklessly. Instead, it fails when a series of reasonable decisions slowly pull a system away from safety. This quiet drift happens because teams prioritize momentum, widening access, adding exceptions, and installing tools that look mature but don’t improve clarity. Nothing seems risky at the moment. Yet, over time, these small choices accumulate exposure until a minor shock reveals a major weakness. Understanding why security fai
Rich Greene
3 days ago3 min read


Zero Trust: What It Actually Means Beyond the Buzzword
Many security breaches begin with a login that looks perfectly normal. A valid username and password, entered from a coffee shop or a home office, can open the door to serious damage. The problem is that traditional security models assume that once inside the network, users and devices are safe. This assumption no longer holds true. Today, work happens everywhere, applications live in the cloud, and stolen credentials behave the same no matter where they are used. The real at
Rich Greene
3 days ago3 min read


Supply Chain Cybersecurity: When the Breach Starts Upstream
Cybersecurity teams patch systems, train employees, and tighten controls, yet breaches still happen. Why? Because the breach often begins upstream, inside a tool or partner you trust. Your supply chain includes every dependency you don’t build yourself: software updates, cloud platforms, managed service providers, contractors with access, and open source libraries. When attackers exploit these trusted connections, your defenses face an adversary disguised as routine operation
Rich Greene
3 days ago3 min read


Phishing and Social Engineering: Why the Strongest Defense Is Being Slower
Phishing attacks and social engineering are no longer just about tricking you with fake files or suspicious links. They rely on a feeling—an emotional rush that pushes you to act quickly without thinking. Modern attackers don’t try to outsmart you with complex code; they try to outrun your judgment by creating urgency, fear, or authority in their messages. Understanding this shift changes how we defend ourselves. The best protection is not faster reactions but slower, more de
Rich Greene
3 days ago3 min read


Ransomware and Double Extortion: Why Backups Alone Don't Save You Anymore
Ransomware attacks have evolved far beyond simply locking files and demanding payment for their release. Today’s attackers use ransomware as a tool to gain leverage over organizations by quietly infiltrating systems, stealing sensitive data, and then threatening to expose that information unless their demands are met. This shift means that relying solely on backups to recover encrypted files no longer guarantees safety. Understanding how modern ransomware groups operate and p
Rich Greene
3 days ago3 min read


IoT Security: Why Every Smart Device Is a Computer That Inherits Risk
Your home didn’t suddenly become unsafe. It became chatty. Devices like doorbells, cameras, smart TVs, thermostats, and speakers quietly talk to the internet all day. Each is a real computer that inherits risk the moment it connects. Manufacturers often prioritize convenience over protection: fast setup, low prices, and vague support timelines. The result is a house full of small computers fading into the background while risk quietly grows. Not because you are a target, but
Rich Greene
3 days ago3 min read


Cloud Security: Why Identity and Configuration Are the Real Perimeter
Cloud security does not fail with dramatic breaches or spectacular hacks. Instead, it breaks down quietly and quickly through small mistakes made under pressure. A public storage bucket left open by accident, an API key accidentally pushed to a public repository, or admin rights granted hastily to meet a deadline—these are the cracks attackers exploit. The cloud is not a physical place but a network of computers owned by others, connected through identity. That identity is th
Rich Greene
3 days ago3 min read


Passkeys and Passwordless Login: Why Shared Secrets Are the Problem
Passwords have been the cornerstone of online security for decades, yet they continue to fail us. The core issue lies in how passwords prove identity: by sharing a secret that can be copied and reused. This fundamental flaw creates a massive security challenge on the internet. We reuse passwords, simplify them for convenience, fall for phishing scams, and companies often store them insecurely. Automated attacks like credential stuffing exploit stolen username-password pairs b
Rich Greene
3 days ago3 min read


Quantum Computing and Encryption: Why "Harvest Now, Decrypt Later" Matters
Encryption protects our digital lives, from medical records to legal files and trade secrets. But the rise of quantum computing is changing the game. Attackers no longer need to break encryption today. They can copy encrypted data now and wait for powerful quantum machines to decrypt it later. This strategy, called "harvest now, decrypt later," poses a serious risk to any data with a long shelf life. Understanding this threat and preparing for it is essential to keep sensitiv
Rich Greene
3 days ago3 min read


The Dark Web: Where Stolen Data Gets a Price Tag
Stolen data does not disappear into a void. Instead, it enters a hidden marketplace where breaches turn into profit. This marketplace operates on the dark web, a network designed for anonymity rather than a separate internet or a fictional hideout. While journalists and activists rely on this privacy to protect their work, criminals exploit it to sell stolen data without any trace or receipt. Understanding how this market works reveals why data breaches often lead to ongoing
Rich Greene
3 days ago3 min read


Identity Theft: Why Data Breaches Don't Stay Abstract
Identity theft is not a dramatic Hollywood heist. It happens quietly, often unnoticed, when systems accept an impersonator as you. The modern economy depends heavily on personal data. Every time you sign up for a service, you give away a piece of your identity. These pieces rarely stay safe or private. When breaches occur, stolen data doesn’t disappear. Instead, it gets copied, combined, and sold, creating profiles that can fool automated systems. This is why the real shock o
Rich Greene
3 days ago3 min read


AI Deepfakes: When Trust Becomes the Attack Surface
Artificial intelligence now allows anyone to mimic a voice or face with just a few samples from voicemails, social media posts, or Zoom calls. This technology does not create flawless illusions but instead creates brief moments of urgency that attackers exploit. These moments often last only seconds—just enough time to trick someone into wiring money, sharing credentials, or granting access. The danger lies not in perfect deception but in breaking the usual pace of trust and
Rich Greene
3 days ago3 min read


What Cybersecurity Actually Is (And Why It's Everyone's Job)
Cybersecurity is often misunderstood as a complex technical problem reserved for experts. The truth is simpler: cybersecurity is the digital version of locking your doors at night. It’s not about paranoia, but about design. Just like you protect your home and belongings with simple habits, you protect your digital life with basic, thoughtful choices before trouble arrives. If you think about it, we protect digital things the same way we protect physical ones. Email, banking,
Rich Greene
3 days ago3 min read


Plaintext with Rich: Security and Tech Without the Jargon
Most tech talk feels like it was written for someone else. Too many acronyms, too much fear, and not enough clarity. That changes here. Welcome to the first episode of Plaintext with Rich , a series designed to break down cybersecurity and technology in simple, story-driven ways. This show promises short, clear explanations that anyone can understand, without drowning you in jargon or panic. Whether you’re a business leader, a curious learner, or just someone who wants to und
Rich Greene
3 days ago3 min read
bottom of page