As part of the experiential learning process students work is posted for comment. The students of the...
I wrote a chapter for a book called “Threats in the age of Obama” that was edited...
Twitter users with a bazillion followers are hubs. Twitter users who are retweeted a lot are routers....
Happy Zombie Day!!!!!
With the impending release of the 60 day cyber review and myriad conferences to cover cyber security...
The blogosphere is alight with discussion over section 18 “Cybersecurity responsibilities and authority” of the draft Cybersecurity...
The cyber arena is filled with the effluvia of vendor driven agendas and political wrangling for budgetary...
As the television show Battlestar Galactica completes its final season I thought it might be interesting to...
I have been reading extensively about whether cyber warfare exists, whether it is a defensive only engagement,...
The Quadrennial roles and mission review report is from the Department of Defense (DOD) to congress and highlights...
This is a working paper identifying various technologies, and providing a set of requirements for a research...
The United States Air Force shut off the Internet connection for Maxwell Air Force Base, the home...
Our long dead Prussian friend understood that tactics change with time and technology, and that strategies remain...
As the nation comes to grips with what is likely another great depression. Regardless of categories or...
A common refrain of the uninformed is that I have nothing to hide so therefore I don’t...