We should call it cyber forensics rather than digital or computer forensics. Why? There are three states...
Hegemony – the political dominance of one state over another Bureaucracy – An unelected government organization that...
Watching the tensions of response and resiliency pulled and prodded by the concepts of conflict and conflagration...
The discussion of the concept of cyber warfare weapons jumps between a few threads that make them...
There has been a lot of ink spilled on the idea of nation-state activities in cyber space...
I love to cook. My family loves to eat what I cook. I have a tendency to...
I am a huge fan of posole. A Mexican stew made with hominy, chilis and pork. It...
I watched the Microsoft Surface introduction with interest. I thought that the idea of the tablet running...
One of the obstacles facing a family changing their diet to vegetarian is the loss of favorite...
Adam Elkus has a great piece on how cyber punk has killed cyber security. I strongly suggest...
It has been a few months since I posted recipes. I have been busy writing my PhD...
With the current list of critical infrastructures inclusive of electricity generation, telecommunication, water, transportation, and financial services...
Freedberg writing “Military Debates Who Should Pull The Trigger For A Cyber Attack” Quotes General Cartwright (Ret)...
The public university systems are under a significant stress from various directions. The complaints about tuition, educational...
In the early 2000s I was working at a company called NCR for a customer called Sun...