The blogosphere is alight with discussion over section 18 “Cybersecurity responsibilities and authority” of the draft Cybersecurity...
Cybersecurity and DFIR
The cyber arena is filled with the effluvia of vendor driven agendas and political wrangling for budgetary...
As the television show Battlestar Galactica completes its final season I thought it might be interesting to...
I have been reading extensively about whether cyber warfare exists, whether it is a defensive only engagement,...
The Quadrennial roles and mission review report is from the Department of Defense (DOD) to congress and highlights...
This is a working paper identifying various technologies, and providing a set of requirements for a research...
The United States Air Force shut off the Internet connection for Maxwell Air Force Base, the home...
A common refrain of the uninformed is that I have nothing to hide so therefore I don’t...
When considering the terrain of cyber space we have a tendency to make that terrain as limited...
The 44th president of the United States while not a technologist is an avid user of technology....
When considering the variable methods of depicting a model it sometimes is not so obvious what will...
When considering the generation warfare model as a tool of categorizing the types or scopes of conflict...
What can a user do that will obscure the path to analysis of a computer system so...
The idea of nation state conflict and conflict of ideology becomes a descriptive problem when looking at...
There is a fairly substantial body of work that looks at the difference between hierarchical organized groups...