Cybersecurity and DFIR
Many people are talking about the attribution of the Sony hack. Was it or was it not...
Abstract: The term “Internet of things” has different meaning to each of the constituent communities building services...
Another day, another breach, and more credit cards are on the open market. I’m not sure what...
Slides as promised. This is a redacted slide deck due to the sensitive nature of some of...
Slides as promised This is an expanded slide deck of a previous presentation. Still got about two-dozen...
Slides as promised. S4 IrespondCon Slides (PDF)
I worry about the over use of threat intelligence. The idea of intelligence came to the information...
I have the discussion all the time with my students. A student will come to me and...
The keynote opened with a we are family theme. I wasn’t quite sure if being welcomed into...
Where I get interviewed by the Loopcast! Data, Forensics, and the Use of Cyberweapons | The...
The following is a concept map (not the only one to be sure) of the cyber forensics...
We should call it cyber forensics rather than digital or computer forensics. Why? There are three states...
The early part of the week was a little slower than normal with not a lot of...