top of page

WELCOME TO CRONINITY

Woman with Headphones
Clicking on a Tablet
Sleep App
Girl with Tablet
In the Woods
Augmented Reality Glasses
Home: Welcome

AI Chip Wars

I recently came across a post about the Netherlands passing a stricter espionage law, explicitly extending to cyber activities, and it...

Key Cybersecurity Metric Concepts

The Importance, and Challenge of Cybersecurity Metrics Metrics are foundational to driving and refining business processes, and...

AI - Supply Chain - More on Gas Turbines

What Are Methane Turbines, and Why Are They in the AI Spotlight? Recent headlines about Elon Musk’s xAI "Colossus" data center in...

AI - The AI Supply Chain - Part 1 - The Data Center

The Foundation of AI: From Data Centers to Intelligence Artificial Intelligence (AI) is no longer a futuristic concept, it’s here, and...

Cyber Deception - Deception/Canaries/Honey X

A honeypot is a 'a container in which honey is kept'. Honeypots should be left for honey! Rule #1: Don’t Call cyber deception...

Insights on the Recent Juniper Router Attacks

Sophisticated Threat Actors Targeting Network Infrastructure: UNC3886 and the Juniper Router Attacks Advanced threat actors are...

Incident Response - File Analysis

During incident response investigations, a critical task is analyzing files for suspicious behavior. There are multiple levels of...

Home: Blog2

CONTACT

500 Terry Francois Street San Francisco, CA 94158

123-456-7890

  • Facebook
  • Twitter
  • LinkedIn
Home: Contact
  • Facebook
  • Twitter
  • LinkedIn

©2021 by croninity. Proudly created with Wix.com

bottom of page