If you hear an information technology professional say there are risks to an organization fire them. There...
Sam
End of the year and time to reflect on a few things. Every year I try and...
Technology and tactics within the realm of cyber conflict are fairly well understood. Networks have been with...
When trying to assess enterprise risk and the threats vectors that create risk there are standard models...
Rickover and Mitchell were visionary ambassadors and petty tyrants of their respective domains of war fighting. Each...
Jeffrey Carr predicts 2012 isn’t going to be a pretty way forward for information security professionals, industry...
Consider the risk management of information and the principles of risk themselves. Do we have a culture...
EDIT 2/27/2012 — A lot of people are showing up looking at this lately. I have an...
Contention: There is a contention that cyber is the electromagnetic spectrum and that point is countered by...
Unlike a lot of technologists I don’t have a bevy of personal computers I use. I only...
I see a problem with the continuing move toward corporate science. As corporations upgrade their research arms...
Another graphic from Sam’s little black book of ideas. This graphic is based on a lot of...
Abstract This paper discusses the issues of technology, music, and the intersection with social movements such as...