3 forms of cyber attribution
There are three forms of attribution: 1) Political attribution based on the actors motives and goals. 2) Technical attribution based on tactics, techniques and means of an entity. 3) Forensic attribution based on the evidence of behaviors and facts.
Motorcycle Monday 2 weeks to Ride to Work Day
Prepping a rally bike 2012 BMW K1600GTL
This gallery contains 8 photos →
Motorcycle Stopping Distance Graph
This gallery contains 1 photo →
Motorcycle Monday 3 weeks until Ride to Work Day
Comparing two stories… Dope Smoking STEM
Comey: FBI ‘Grappling’ With Hiring Policy Concerning Marijuana “James B. Comey said Monday that if the FBI hopes to continue to keep pace with cyber criminals, the organization may have to loosen up its no-tolerance policy for hiring those who…
Garmin iPhone application for motorcycle rallies
This is a quick description of how I use my iPhone on motorcycle rallies. I also use two BMW Navigator IV GPS but the iPhone is actually a faster processor, better GPS, and shows up better in daylight. In my…
Tools used against the enterprise Part 3
x x x x x x x x x
If the job sucks be awesome
I see a lot of discussion at hacker cons or security cons depending on your predilection that says something to the effect “I’m burned out and drink to much.” The information security community has a hidden underbelly that hangs over…
U.S. Bank of Cyber: An analysis of Cyber Attacks on the U.S. Financial System
This gallery contains 1 photo →
Fortune cookie: Career stages
At one point in my career I just wanted to be able to do my job. Then I got to the point I wanted to be able to do my peers jobs. When I became a supervisor I thought I…
Research Note: Security, privacy, insider threats, and espionage
I am concerned about how this discussion has evolved, and it is influenced heavily by political and ideological biases. More importantly, it is in a box, which does not reflect a stern reality. I have been told that “Privacy is…
Cyber Security versus Information Security
Over at NovaSec @grecs has a post titled Cyber Security versus Information Security. He acknowledges that there are some problems in the lack of definitions. This has been a long time (eight decades) discussion in the field. First I have to admit that…