There is this place called Casey’s Crab Company. The wife and I were on our way to...
Sam
There are no absolutes including the absence of absolutes. As such any discussion of adversary sophistication is...
I’ve long been a proponent of sharing threat intelligence. The technical level of this sharing is usually...
Many people are talking about the attribution of the Sony hack. Was it or was it not...
Abstract: The term “Internet of things” has different meaning to each of the constituent communities building services...
So we were teaching the dog a new trick. We thought teaching the dog how to use...
I will be on a panel at FedCyber 2014 November 5th at Tysons Corner in Virginia. I’m...
Here are the slides as promised. 2014 CERIAS CERT Discussion (CISSP) (pdf)
I research the threats and crimes against society where processing and communications artifacts are used to disintermediate...
I am not rich or famous and most assuredly I am very average in intellect and capability....
In 1999 I was divorced. I had been separated on and off again about 7 of the...
Slides of my presentation today at the Indianapolis Summit. 2014 November Indianapolis Summit Threat Trends
Apple CEO Tim Cook and previously Steve Jobs talk often about the idea of the iOS application...
Does your enterprise threat intelligence feed get you down? Does the wide-ranging list of IP’s, URLs, and...