Article Index
The case for Packetfence – an open-source network access control (NAC) platform that delivers enterprise-grade access management without commercial licensing lock-in.
Exploring making Adobe Acrobat Sovereign compatible – You cannot make an Acrobat Pro subscription fully sovereign, but you can harden a deployment.
Has the U.S. built the World's Largest Spy Network? – How far down the rabbit hole does this go?
Canadian Sovereign Threat Exercise: Windows 11 (further options) - comparing a cloud integrated Windows 11 machine with a Sovereign focused deployment
Canadian Sovereignty threat Exercise: Apple - How vulnerable is a Mac with a default configuration and a Sovereign focused configuration
Canadian Sovereignty threat Exercise: Intune managed IOS/Android – how vulnerable are our managed mobile devices?
Canadian Sovereignty Threat Exercise: Full Windows server - how vulnerable is a fully secured windows server using all the common Microsoft tools?
Canadian Sovereignty Threat Exercise: Linux server with Sentinal One – Is a hardened linux server running Sentinal One vulnerable to full data access by the US government?
Canadian Sovereignty Threat Exercise: Windows 11 – Is a fully secured fully managed Windows 11 system using Office 365 vulnerable to full data access by the US government?
The Vanishing Chain of Accountability – Has our control over data privacy slipped entirely out of our hands?
Designing Big System IT – Beyond the Bucket – Why One-Size-Fits-All IT Planning Backfires
Consultant Bias Overview – Are you getting the advice you need?
Sorting Through Sovereign Network Infrastructure – Is sovereign secure switch control possible?
Consultant bias – the Sovereignty test – chatgpt analysis – Are Canadians getting the advice they need
Beyond Borders: Is our private data exposed to US surveillance? What the CLOUD Act and FISA mean for Canadian Data Sovereignty – A risk assessment
Compliance Is Not Security: Why IT Leadership Must Recenter on Fundamentals – We need to get to the basics of real security
AI Is Not the Villain. Our Use of It Might Be. – putting the dangers of AI in perspective
The Great Data Scavenger Hunt – Highlighting the essential task of identifying and organizing our data
Surveillance and Suppression – The new normal? – The march towards losing our right to privacy?
EPP, EDR, XDR, MDR... WTF?! – demystifying IT security
Public Accountability, Cloud Risk, and FIPPA – If security problems exist we cannot hide the bad news!
Does a Mac and iPhone protect me from U.S. surveillance – not completely…
Silencing Windows from Over Sharing – making windows more private