Forbes.com interviews leaders on “10 Ways to Fix Cybersecurity“. It’s useless — in fact (as I’ll demonstrate below) worse than useless.The problem is that these leaders aren’t experts, they are fluff. Their technical competence extends only as far as knowing…
Strategic information security
It’s not only a good idea it is one that most people will never understand making it absolutely the next buzzword at security conventions. Strategy is often misunderstood. It simply isn’t an easy term for most people to get there…
Motorcycle Monday Ride to Work Day
Reflections on hackers and graduate education
This isn’t going to be a long post on how to become a hacker. This is to long didn’t read and in not reading make silly comments that have nothing to do with the content long. Chances are if you…
Dessert at Swissotel in Estonia
Motorcycle Monday 1 week to Ride to Work Day
Cyber Fratricide (CyCon CCD COE 2014 Presentation)
3 forms of cyber attribution
There are three forms of attribution: 1) Political attribution based on the actors motives and goals. 2) Technical attribution based on tactics, techniques and means of an entity. 3) Forensic attribution based on the evidence of behaviors and facts.
Motorcycle Monday 2 weeks to Ride to Work Day
Prepping a rally bike 2012 BMW K1600GTL
This gallery contains 8 photos →
Motorcycle Stopping Distance Graph
This gallery contains 1 photo →
Motorcycle Monday 3 weeks until Ride to Work Day
Comparing two stories… Dope Smoking STEM
Comey: FBI ‘Grappling’ With Hiring Policy Concerning Marijuana “James B. Comey said Monday that if the FBI hopes to continue to keep pace with cyber criminals, the organization may have to loosen up its no-tolerance policy for hiring those who…
Garmin iPhone application for motorcycle rallies
This is a quick description of how I use my iPhone on motorcycle rallies. I also use two BMW Navigator IV GPS but the iPhone is actually a faster processor, better GPS, and shows up better in daylight. In my…
Tools used against the enterprise Part 3
x x x x x x x x x