I track about 50 universities that use pieces of content from SVEOTI.net and previously from SELIL.com. In...
Cybersecurity and DFIR
Rather than throw more ink on the evolving story of the recent breaches of two security companies....
There will be a lot of ink spilled on this topic. My only goal with this simple...
I don’t know how to explain it. I don’t know how to make it relevant to you...
First, I do not believe or agree that GDPR applies to a personal website when I have...
The blinds were drawn, a glass of water sat sweating in the humidity, and as I looked...
Working across organizational boundaries I hear the same refrain often enough to want to discuss it. From...
For me a job is usually never about the compensation. I’m a challenge seeking type personality. However,...
Key Points: Attribution has three distinct layers; political, technical, and forensic with each having different confidence levels...
Lots of snark talk from the military types out there. I understand it, but don’t have to...
Many people are talking about the attribution of the Sony hack. Was it or was it not...