There is a new exploit and what the heck am I going to do now? If you...
Cybersecurity and DFIR
Introduction: The Myth of the “Client List” and the Messy Truth For years now, people have obsessed...
I keep getting asked to interview on the topic of election system security and whether I think...
Rather than throw more ink on the evolving story of the recent breaches of two security companies....
There will be a lot of ink spilled on this topic. My only goal with this simple...
I don’t know how to explain it. I don’t know how to make it relevant to you...
First, I do not believe or agree that GDPR applies to a personal website when I have...
The blinds were drawn, a glass of water sat sweating in the humidity, and as I looked...
Working across organizational boundaries I hear the same refrain often enough to want to discuss it. From...
For me, a job is usually never about the compensation. I’m a challenge-seeking type personality. However, if...
Key Points: Attribution has three distinct layers; political, technical, and forensic with each having different confidence levels...
Lots of snark talk from the military types out there. I understand it, but don’t have to...