The Art of Cyber Security

guardDog leaves others hangin’ in the dust.

Illustration by Daniel Enrique De León

Cybersecurity has become the juggernaut of an elevated commerce culture spread among diversified industries that play a vital role in securing our most precious assets. In fact, privacy has become a “priceless luxury” in the modern age among creators & collectors, developers, exhibitioners, and gallerists’ that ensues its relevance in B2B, private sector firms, gamers, high-end retailers, and individuals alike.

Between a mass convergence of smart devices and the devised chaos that has infiltrated our everyday lives, technological warfare of our “human rights” is being stripped away second by second by a faceless enemy of predators paraded as a Superpower of Communication preying on our vulnerabilities and tracking our every move – inflicted with the sickness of exploitation, manipulation, and violation. It has become appallingly clear that the invasion of a disenfranchised “network” is highly frangible against criminal factions of nefarious activities from on-line tactics to propagated interrogation that compromise our safety and put us gravely at risk.

Cyber trespass, a term many may not be familiar with, is defined as having network unauthorized access to all proprietary information of financial statements, patents, and accrued data from consumer purchases, business portfolios of clients, patient/s medical records  to controlling the water supply. From the remote worker to purchasing a hot dog at a sports arena, complacency is the mindset of vulnerability.

Venü speaks with figureheads across industries to gain their perspective on protection and creating global empathy in the “Modern Age” of Commerce.


No one understands the need for security better than screenwriting legend William Wisher of the movie I.T., YOUR LIFE IS NOT SECURE,” released in 2016 starring Pierce Brosnan. Bill conveys, “Given how the world is becoming more and more digital with every passing day, having cyber protection measures in one’s own personal life is more than just prudent. It will need to become a part of everyone’s lives.”

In a world full of connected collusion, innovative intelligence security mandates are needed behind the leading enterprise of threats to increase our well-being. Although there’s an increased number of field investments, we haven’t been able to keep up with the pace to mitigate the explosion of losses from cybercrime attacks and data breaches.

Wisher ushers, “In the significant amount of films and programs that have been made about hacking and theft, I really don’t know as to whether art imitates life or vice versa, but any idea you throw out in a creative medium will likely give “bad actors (hackers and or cyber terrorists) some glorified inspiration. It can’t be helped, though.”

“I believe cybersecurity is essential in the film and television business now more than ever since streaming” is about the only way products can be consumed. Hacking and I.P. theft are therefore more of an issue than in pre-COVID times. Films and television shows can be stolen and sold in black markets overseas (and even domestically), robbing artists and companies of vast amounts of income. Asia has been the worst offender, traditionally, but it’s probably global now.”

How do we infuse value, purpose and implement a solution into the cyber web of the world’s most connected platform?


When query about enabling technology to have a ‘code of ethics in cyberspace with the understanding that 59% of our Earth is currently wrapped in the cyberweb of connectivity and 100% of the Earth’s inhabitants are totally connected by sheer human fiber, magnate and real estate developer Moishe Mana gave us the down and dirty of his take on the matter.

“The world is going through a new revolution similar to the industrial revolution. This can and will lead to similar consequences.” Democracy must declare legislative privacy boundaries to counteract the abuse and protect us from its strangleholds’ stigma. “The right of speech doesn’t give you the right to bully, incite, or spread rumors. Tech media needs to show restraint and use their power wisely and effectively to stop abusive behavior. If not, we’re headed towards a digitized jungle of chaotic discord.” Moishe goes on to say that it’s easier to harness anger and frustration than to harness compassion.” As a society, we must teach humanity and uphold ourselves in high regard in what it means to be good, to be ethical.”

Mana considered questions of re-educating the connected 59% of the Earth’s population in the proper use of the web and ethically extending the benefit of cyber connectivity to the balance of our 41% Earths community that is not yet connected as loaded. “Capitalism has gotten the best of us, and with this comes fear and greed. It continues to take a chunk out of our livelihoods. Corporations should have social responsibilities that are not only profit-driven. As far as connecting the rest of the world, we need to do so, but with commercialized consideration to build upon a commerce community. Otherwise, fast-tracking will have social unrest and severe consequences in the end.”


Moniker, “The Concierge of Cybersecurity,” what differentiates guardDog as a leader in the industry is between the duality of visibility and obscurity that targets the threat at its highest peak and prevents it from happening.

Correspondent Glenn Merlin Johnson, President of Adaptive Design Group, speaks with cybersecurity expert, Founder & CEO at, and bel esprit of Technology, Peter Bookman, about device and network challenges that we see today and what drives the intelligent security lane home to success.

“There are three valid points of protection that are the blueprint to our operational devices and countermeasure attacks,” deliberates Peter. Deter, apprehend, and conceal without interference to our clients’ daily practices. “Most solutions rely on professional services and know-how. We see a tremendous gap in the system today with white-glove professionals. Out of the 22K + solutions in the marketplace, we are the only device that disarms attackers without selling your data.

“It’s a humbling experience to be able to offer for the first time complete visibility of scanned threats simply by just plugging into a router anywhere at any time.” Its automated protection at your fingertips which sees the potential danger coming from a mile away, sidesteps it, stops it, and then defragments it so that it can’t ever get to your network again.

We work for you, so you don’t have to. It takes five minutes to install, and you’re up and running.

They also cover “Edge Territory,” which means that any devices connected to the network, such as your smartphone or Alexa, need to be under watch against threats because there’s a lack of visibility you’re able to see. Lack of protection in the “Edge Territory” space makes up a great deal of cyber pollution where once the existing devices had undetected threats; you can now prevent them from happening. We augment and serve other products in the arena to make them easily secure at surprisingly low costs.

Our devices go beyond cognition learning of automatic response to incident happenings and anticipate an attempted threat’s next moves before one is made.

The problem with other devices is that they are inherently at risk at any given point with a database that’s being chained to their devices in multiple places, and vendors that store their information and track potential leaks under the radar to cause commination. With, we have the best of both worlds – having the range of vision to safeguard the device and preserving the network that may impact a device while fortifying them in between.

“Our platform in itself is highly unique to the industry in which the importance of implementing cybersecurity with a lifestyle element brings forth a humanizing aspect to it. We refer to this process as a tailored assessment to address critical concerns and see results in real-time. Our overall objective is to provide you with the technical amenities to work, play, and express yourself without the worry or hassle”, confers Peter.

Peter Bookman has been leading teams and disrupting markets for the past 25 years. He is an expert in cybersecurity technology and is a seasoned executive who has launched many industry firsts with numerous successful exits.

ANOUK WIPPRECHT, Fashion Tech Innovator

Diving deeper into industries where privacy is the primary concern, FashionTech Innovator Anouk Wipprecht shares the possibilities of implications that could arise.

In a field like ‘FashionTech,’ we often work with wearable electronics and different sensors to measure both your body and the world around us. For things to work well, these systems need data to thrive. It allows us to use technology comfortably and passively, as it can listen and recognize how your body operates to distinguish stress levels, unlike a phone or device that you need to actively engage with. These sensors can measure things like muscle contraction (EMG), heartbeat (HRV), Electrodermal Skin Activity (EDA), lung volume (RESP), and brain signals (EEG), amongst many other symbiotic learning systems.

Where ‘FashionTech’ is becoming increasingly relevant in different sectors of research, keeping up with the progression of Artificial Intelligence is going from the poetic sense into a scary range of possibilities with doomsday scenarios of where our future lies with insurance companies tracking your bad habits to personal information that can be breached. My answer to developers in this field is to keep things simple, secluded, and non-invasive; thinking of creative ways to gather the data you need without impacting or circumventing anyone’s privacy or security measures without consent.


As a professional lighting design, controls, and technology designer in the custom home arena, it has always surprised Glenn that everyone embraces and expects the multiple technologies that are in today’s automobiles, but consumers are hesitant to implement these technologies into their homes.

Automobile designers and engineers have been ahead of their time making making cars more intuitive, luxurious, and sexier than the custom luxury home. After all, there’s nothing like the bond you have between you and your car.

Frank Rinderknecht, Founder and CEO at Rinspeed in Switzerland is on the cutting edge of automobile design and prototyping that rivals any James Bond film or futuristic jet setter affectations and space travel that would make Jane Jetson proud.

Frank shares, “Intuitive Ai and onboard safety of internet connectivity and cybersecurity filtering is a must as we move forward in this new world. I agree with you Glenn, we all understand that technology is supposed to simplify our lives without complexities to enhance a more seamless personal experience.” Just think, sit back and relax, read a book, work on a proposal, have a nice conversation with your passengers, enjoy the beautiful scenery, or take in a luncheon meeting all within the comfort of a vehicle that’s engaged in safety and delivering you to your destination.

Frank continues to extrapolate, “Autonomous cars are the wave of the future with a human component. We still have a way to go in offering autonomous vehicles around the globe. It will take a while for us humans to fully embrace the level of controls by AI in our vehicles, but little by little, like everything else in our technological world, we’ll adjust.”

JAMIE OTTILIE, CEO of Telltale GAMES and LCG Entertainment

Gaming is the new strategy for building corporate identity across the stratosphere. It has grown into a business of epic proportion throughout every imaginable industry, but it also means that amplified security measures are needed.

Jamie Ottilie, CEO at Telltale and LCG Entertainment, has a little heart-to-heart with us on growing security issues.

Games have gone increasingly digital, whether that means digital distribution – games purchased and delivered via download versus physical retail goods; the use of in-game digital goods and micro-transactions; or games being played entirely “in the cloud’ instead of being tied to a PC or console.

Studies have shown that games help teach critical thinking, problem-solving, empathy, and understanding and develop quick reflexes. Research shows that some children learn better and retain the information longer or more accurately through games in a play-based curriculum. In distance-learning times, teachers have been using games to help keep students more focused during online school. There are, of course, games explicitly designed to teach subjects such as math, reading, or coding, but there are teachers out there using games like Monopoly or Axis & Allies to teach economics and history. We know of a teacher who uses Batman: The Telltale Series to teach critical thinking, and he has a great blog dedicated to video games as teaching tools.

As players spend more time online and share more of their sensitive information, the need for cybersecurity increases. As our technologies get more complex, hackers and cyber bullies get more competent, and we must stay one step ahead of them. “People play games to relax, momentarily escape, and immerse themselves in another world, and those players want and deserve a gaming experience where they feel safe and can trust their information is secure”, cites Jamie.

Some of the types of cyberattacks our industry sees include phishing for personal information and, of course, all-too-common cyberbullying. A variety of attacks that might be unique to games is the theft of someone’s digital goods and characters in which a player may have years and significant funds invested. Our industry has recently seen the emergence of “deep fake” techniques used to spread false information or incite factions in a community.


Automotive brands are increasing incident response capabilities to handle cybersecurity and privacy issues.

President and Owner at Ferrari-Maserati of Fort Lauderdale, Garrett Hayim, tunes into the conversation.

At the forefront of this issue, we developed our own technology to protect our own interests and protect our clients. Our clients are like family, and they trust us with confidential information and significant funds. We wanted to go beyond what any other dealer was doing. While I cannot detail our security protocols to protect their integrity, I can share a few details.

First off, we have limited fraud by creating a digital verification system that checks both inbound and outbound wires in a way that is unique and very difficult to bypass. We also restrict the storage of our client’s personal information to our system, where it is encrypted and even limits access to most employees who do not have the proper clearance level.

A brand that wants to thrive must embrace ethics in its commerce. It’s not negotiable. Accepting an ever-changing technology is an equal necessity to have security measures in place, or you will become extinct. Most people don’t worry about cyberterrorism until it’s a real problem.

“Sustainability should not be reactionary.”

We really do not deal in cars that have AI systems. The feeling of the connection between such a highly tuned and engineered machine and the driver is at the core of what we provide and is simply indescribable in print. There is no other car in the world that creates that bond. “All I can say is ­­—Come feel a Ferrari for yourself!

When it comes to sniffing out the crime, guardDog is the antidote to driving criminals straight off their tracks.!


Leave a Reply

Your email address will not be published. Required fields are marked *