End of the year and time to reflect on a few things. Every year I try and...
Technology and tactics within the realm of cyber conflict are fairly well understood. Networks have been with...
When trying to assess enterprise risk and the threats vectors that create risk there are standard models...
Rickover and Mitchell were visionary ambassadors and petty tyrants of their respective domains of war fighting. Each...
Here is one of the challenges I have been facing our vegetarian diet. My husband love ravioli....
Jeffrey Carr predicts 2012 isn’t going to be a pretty way forward for information security professionals, industry...
Consider the risk management of information and the principles of risk themselves. Do we have a culture...
EDIT 2/27/2012 — A lot of people are showing up looking at this lately. I have an...
Contention: There is a contention that cyber is the electromagnetic spectrum and that point is countered by...
The Internet has done strange things to us. We think we are more important than we are...
Abstract This paper explores two areas of the gender and technology in education issues. The first issue...
Unlike a lot of technologists I don’t have a bevy of personal computers I use. I only...
I see a problem with the continuing move toward corporate science. As corporations upgrade their research arms...
Another graphic from Sam’s little black book of ideas. This graphic is based on a lot of...