Abstract: The term “Internet of things” has different meaning to each of the constituent communities building services...
Cybersecurity and DFIR
Another day, another breach, and more credit cards are on the open market. I’m not sure what...
Slides as promised. This is a redacted slide deck due to the sensitive nature of some of...
Slides as promised This is an expanded slide deck of a previous presentation. Still got about two-dozen...
Slides as promised. S4 IrespondCon Slides (PDF)
I worry about the over use of threat intelligence. The idea of intelligence came to the information...
I have the discussion all the time with my students. A student will come to me and...
The keynote opened with a we are family theme. I wasn’t quite sure if being welcomed into...
Where I get interviewed by the Loopcast! Data, Forensics, and the Use of Cyberweapons | The...
The following is a concept map (not the only one to be sure) of the cyber forensics...
We should call it cyber forensics rather than digital or computer forensics. Why? There are three states...
The early part of the week was a little slower than normal with not a lot of...
All right so the title is total link bait. The United States seized some number of computers...