PART 2: Fix the Cyber Market Disfunction
In Part 1, I asserted that the reverse market forces at play in the cyber landscape (i.e., unchecked monetization of cybercrime) would…
A catch-all for topics related to cybersecurity.
In Part 1, I asserted that the reverse market forces at play in the cyber landscape (i.e., unchecked monetization of cybercrime) would…
Sitting at a National War College event in Colorado Springs recently, attending a forum of thought leaders addressing a Public-Private Partnership model…
H.R. 624 is currently being considered by Congress for enhancing Cybersecurity Intelligence Sharing. The bill passed the House April 18, 2013, and…
Small and medium-sized enterprises in the DOD supply chain have some work cut out for them to come into compliance with recent…
This essay presents a short history on the development of information sharing frameworks, one feature of the recent Executive Order on cybersecurity…
When looking at recent case law and Supreme Court rulings on how advances in technology affect the rights of the accused it…
This essay provides links to some tools that analysts can use to visually display patterns of attack against a WordPress website.
Here is a link to the final Cybersecurity Executive Order signed by President Obama on February 12, 2013 with a summary of…
Managing employee communications devices in the always-connected global business community has become an important issue for information security personnel engaged in the…
An analysis of the Obama Administration draft cybersecurity Executive Order.