Sam
Presentations (PDF) Teaching Presentation Research Presentation Blog Posts Considerations of defense in depth Attribution of cyber...
For those that are interested. The following list of IP addresses were attempting to brute force log...
As a FED covered by the Hatch Act most onerous elements I have eschewed all political discourse...
In the continuing attempt to prove to the wider world I’m a desirable hire as a CISO...
Over the years I have had to go around, over, or through some interesting items as I...
If you don’t have a successful information security program don’t waste your dollars or time on threat...
So you’re a new CISO and you just arrived at the organization. What should your personal interaction...
This is more from my noisy search for my next windmill to tilt at in what will...
Key Points: Attribution has three distinct layers; political, technical, and forensic with each having different confidence levels...
Lots of snark talk from the military types out there. I understand it, but don’t have to...