Digital Memorial Tribute: Martin Zimmermann
By: Jane Ginn, MSIA, MRP February, 2015 It has been two months since the passing of the late Martin Dipo Zimmermann, my…
By: Jane Ginn, MSIA, MRP February, 2015 It has been two months since the passing of the late Martin Dipo Zimmermann, my…
The cybersecurity private sector community has recently been working hand-in-hand with public sector law enforcement agencies to take-down these insidious botnets.
H.R. 624 is currently being considered by Congress for enhancing Cybersecurity Intelligence Sharing. The bill passed the House April 18, 2013, and…
Threat actors harvest email addresses, identification numbers, user name/password combinations, credit card information, health information and other personally identifiable information for nefarious…
Small and medium-sized enterprises in the DOD supply chain have some work cut out for them to come into compliance with recent…
This essay presents a short history on the development of information sharing frameworks, one feature of the recent Executive Order on cybersecurity…
When looking at recent case law and Supreme Court rulings on how advances in technology affect the rights of the accused it…
This essay provides links to some tools that analysts can use to visually display patterns of attack against a WordPress website.
Security specialty firm Alien Vault develops excellent infographs that summarize in visual form some key points about cyber security.
Here is a link to the final Cybersecurity Executive Order signed by President Obama on February 12, 2013 with a summary of…