The last few years I’ve gotten asked by the media to talk about this. Here are my notes on best practices for staying safe shopping online over the holidays. I welcome ideas. Remember this is for “joe average user” and…
Purdue team takes home top honors in DC3 challenge
I would like to congratulate four CIT graduate students in their win of the Defense Cyber Crime Center (DC3) cyber forensics challenge. Team “Or11–” came together and was composed of these four students. William Ellis Jacob Kambic Eric Katz Sydney…
Motorcycle Monday
This gallery contains 1 photo →
Motorcycle Monday
This gallery contains 1 photo →
Research note: A new way to think about insider threats
We talk about motivation often when thinking about the insider threat to information assets. The concept of a turn cloak, spy, or trusted individual turning against the interests of an organization has always been a risk. We vilify, and in…
Motorcycle Monday
This gallery contains 1 photo →
Social Media: Benefit and costs
I have been flirting on and off with social media for quite some time. Between this blog in the various versions of the years, and traditional post dot bomb incarnations of social media I have had a varying presence. Currently…
Next big thing: Personal clouds in your home
The asserted revelations of the national spy apparatus has created an interesting set of conundrums for business and individuals. Putting away the trivialities of those who say “If you have nothing to hide you have nothing to worry about.” There…
Motorcycle Monday
This gallery contains 1 photo →
2013 Adobe Data Breach (on going analysis)
This gallery contains 1 photo →
Motorcycle Monday
This gallery contains 1 photo →
Passion to teach: The false choice of research over teaching
There is the sense in the academic legions of research professors that teaching is evidence of failure for those who cannot do research. This is no different than the adage that those who can do, those who can’t teach. In…
Research Note: Defining attacker knowledge, skill, and ability
Introduction There exists an area of undiscovered value within the intersection of information assurance and security, standardized education, cognitive methods, and assessments of cognitive methods. At this intersection are the basics of profiling and evaluating the knowledge, skills and abilities…
Careers in government: Challenges in recruiting
I teach a discipline almost completely on topics of interest only to government entities. By far and in most cases the only people interested in investing towards professional incident response requiring forensics level skills is the government. Whether a local…
Concept mapping: Cloud forensics
This gallery contains 4 photos →