The Center for Strategic and International Studies (CSIS) recently released a report titled “Securing Cyberspace for the...
Cybersecurity and DFIR
I have been working on an information operations graduate/masters degree curriculum using the sections, topics, and strategies...
The floods are almost bad enough, but to bring people up to speed who might have missed...
An idea that “Haft of the Spear” had was to blog tank a policy paper. With a...
Media reports have created a meme that any or all conflict that occurs in cyber space is...
Some links to items we discussed in class and some background materials. I included a sampling of...
The following is a partial bibliography of topics related to computer or cyber forensics.
Some of the cases we discussed tonight can be found at the following links. Steve Jackson Games...
Where in the hierarchy of information operations does cyber warfare belong? What is the definition of information...
Reported today at NextGov.Com The Air Force on Monday suspended all efforts related to development of a...
There has been a lot of hysteria and accusations thrown around in the idea that Russia is...
When considering the doctrinal documents of computer network attack (CNA), and the hierarchical relationship to information warfare...
Short post to posit a what if. “What if” you could analyze the entire network infrastructure of...
Introduction If you are going to make war you should practice war. No Marine traverses the line...
The definition of cyber space came up again as a primary topic at the United States Air...