Thoughts & Articles

Mexican Immigration – Then and Now

Published on November 30, 2025 by Benjamin Knauss

The history of U.S. policy toward Mexican migration is a cyclical story of the U.S. government actively recruiting and institutionalizing the flow of labor to serve its economic needs, followed by nativist backlash and restrictive legislative actions when those labor needs lessened or when economic/social strain increased. The Welcoming Hand (1910s – 1964) The U.S. […]

Read More →

Heist Movies vs. Reality #7: The Sequel

Published on November 4, 2025 by Benjamin Knauss

Hollywood loves a good sequel. Ocean’s 12, 13, and the crew coming back for “one last job” with a new target, higher stakes, and a bigger score. We all know the formula. In cybersecurity, the sequel is considerably worse. You paid the ransom. The attackers promised to go away and definitely, absolutely, pinky-swear deleted your […]

Read More →

Heist Movies vs. Reality #6: The Quick Getaway

Published on November 2, 2025 by Benjamin Knauss

Every heist movie climax features a frantic escape, complete with high-speed chases through city streets, helicopters on the roof, and getaway vehicles like boats and trains. The crew frantically switches vehicles, destroys evidence while on the run, and aims to escape in 60 seconds or less. What about ransomware operators in 2024? They work from […]

Read More →

Heist Movies vs. Reality #5: Cracking the Vault

Published on November 1, 2025 by Benjamin Knauss

In heist movies, cracking the vault is an art form: • The safecracker listens for tiny mechanical clicks • They use stethoscopes, fiber optics, thermographic cameras • It takes a specialist with years of experience • There’s always dramatic music and beads of sweat In 2024? Attackers know your password is “Summer2024!” because: The Reality: […]

Read More →

Heist Movies vs. Reality #3: Bypass the Laser Grid

Published on October 30, 2025 by Benjamin Knauss

Mission: Impossible made us believe breaking into secure facilities requires: Real attackers in 2024? They just check CVE databases for vulnerabilities you haven’t patched yet and walk through the front door you forgot to lock. The Reality: The average time to exploit a known vulnerability after patch release? 7 days. The average time organizations take […]

Read More →

Heist Movies vs. Reality #2: The Elaborate Plan

Published on October 29, 2025 by Benjamin Knauss

Remember the briefing scene in every heist movie? Blueprints covering the walls. Red string connecting photos. Months of surveillance. Danny Ocean studying vault schematics like it’s the Da Vinci Code. Real attackers in 2024? They compromised SolarWinds once, and 18,000 organizations voluntarily installed the malware for them. The Reality: Supply chain attacks are the ultimate […]

Read More →

Users are… important?

Published on October 28, 2025 by Benjamin Knauss

For years, the narrative has been “users are the weakest link” – and honestly, I think this framing has done more harm than good. When we position people as liabilities rather than assets, we create a culture of fear and blame. Employees start hiding mistakes instead of reporting incidents. They see security as an obstacle […]

Read More →

IceBlock == Freedom of Speech

Published on October 25, 2025 by Benjamin Knauss

The removal of the IceBlock app from the App Store, as reported by CNN, is a deeply concerning move for community safety and freedom of speech. https://lnkd.in/gHvhz-Zh When a tech platform capitulates to government pressure to remove a community-level alert tool used by over a million people, it doesn’t solve any underlying issues. It simply […]

Read More →