The Mess of Fostering Competition in Cybersecurity Products
May 9, 2026
What might be towards the top of the heap of all the issues compiled together, May of 2026, consistent with logic, has something and something where computers are involved.
The computer 'age' being here pretty evidently, implies that it's not just in the USA and some advanced nations, and a few hot spots in Far East that have really taken off in developing technology. Computers is global.
Everybody, just about, save maybe a few groups still running around in the deep jungles waiting for educational TV camera crews to catch them acting like they don't know what having no sense is, has got computers.
The good guys have them, the bad guys, the right, the left, moderates, extremists, those in allegiances, enemies to other allegiances, and if course those who try to take all the money they can get by pandering on everybody's side.
So if cybersecurity technology is going to be what protects a set of computers from a cyber attack, how do you let your friends know without letting your enemies, nevermind putting yourself out there for greater risk of cyber attacks by the mere act of trying to get advice and telling people your problems while exploring what the options are?
Marketing companies make money successfully marketing products. Usually, the more the products sold, the more successful the marketing operation. Exclusivity aside. The more products bring dold can come through broadening your market and market penetration. That means, you might start marketing to both friends and enemies of a reference frame's anchor.
Your buddy company comes up with a solution. Help him market more of it. Get a finder's or referral fee for getting him more clients. Some of those clients layer launch a cyber attack on your computer. They know your strengths and vulnerabilities because they know what cyber security measures you took.
What a joke! Around and around it goes. Is there even such a thing as being 'fully cybersecuritized'? Probably not, because sharing something, whether it be components or virtual webspace, often, has to take place in order to use computers as the tool that it's out here to do.
So just how do you successfully build a 100% Fort Knox of a safe set of computers?
Is there even such a thing?
The computer 'age' being here pretty evidently, implies that it's not just in the USA and some advanced nations, and a few hot spots in Far East that have really taken off in developing technology. Computers is global.
Everybody, just about, save maybe a few groups still running around in the deep jungles waiting for educational TV camera crews to catch them acting like they don't know what having no sense is, has got computers.
The good guys have them, the bad guys, the right, the left, moderates, extremists, those in allegiances, enemies to other allegiances, and if course those who try to take all the money they can get by pandering on everybody's side.
So if cybersecurity technology is going to be what protects a set of computers from a cyber attack, how do you let your friends know without letting your enemies, nevermind putting yourself out there for greater risk of cyber attacks by the mere act of trying to get advice and telling people your problems while exploring what the options are?
Marketing companies make money successfully marketing products. Usually, the more the products sold, the more successful the marketing operation. Exclusivity aside. The more products bring dold can come through broadening your market and market penetration. That means, you might start marketing to both friends and enemies of a reference frame's anchor.
Your buddy company comes up with a solution. Help him market more of it. Get a finder's or referral fee for getting him more clients. Some of those clients layer launch a cyber attack on your computer. They know your strengths and vulnerabilities because they know what cyber security measures you took.
What a joke! Around and around it goes. Is there even such a thing as being 'fully cybersecuritized'? Probably not, because sharing something, whether it be components or virtual webspace, often, has to take place in order to use computers as the tool that it's out here to do.
So just how do you successfully build a 100% Fort Knox of a safe set of computers?
Is there even such a thing?
Posted by HCN.


