Cybersecurity and DFIR
Rather than throw more ink on the evolving story of the recent breaches of two security companies....
There will be a lot of ink spilled on this topic. My only goal with this simple...
I don’t know how to explain it. I don’t know how to make it relevant to you...
First, I do not believe or agree that GDPR applies to a personal website when I have...
The blinds were drawn, a glass of water sat sweating in the humidity, and as I looked...
Working across organizational boundaries I hear the same refrain often enough to want to discuss it. From...
For me a job is usually never about the compensation. I’m a challenge seeking type personality. However,...
Key Points: Attribution has three distinct layers; political, technical, and forensic with each having different confidence levels...
Lots of snark talk from the military types out there. I understand it, but don’t have to...
Many people are talking about the attribution of the Sony hack. Was it or was it not...
Abstract: The term “Internet of things” has different meaning to each of the constituent communities building services...