It was a dark and stormy night. In the darkness so deep that hearts shrink from fear...
The military has been an active, interested, busy, and pretty much clueless newbie to the art and...
Cyber warfare means many different things to people. As a population of researchers and practitioners we have...
As promised. The dates to be aware of as discussed in class. September 24th IDHS District 1...
Some links for the class. DHS has a new tool called GAP, the tool is about gathering...
“In academia there is no reason for two adversaries to take the field where one triumphs at...
The new cyber coordinator position (AKA cyber czar) as described is a position with no real authority,...
Here is my submission for South by South West! Help a guy out we need all the...
Abstract For the final lab the teams will be taking all that they have learned this semester...
Abstract There is a fine line in securing a system and maintaining the usability of that system....
Abstract The purpose of this exercise is to emulate a realistic attack/defense scenario in a virtual test...
Abstract Penetration testing has been the point of this course. Performing a live penetration test against a...
Abstract In anti-forensics attackers attempt to erase or disguise the traces of their intrusion and try to...
I’m ugly, bald, old, and fat. Given the aforementioned I can do little about the first three...
It has been over a month since I updated you on the garden! In those weeks, we...