A Pilot Program for Critical Infrastructure
Cybersecurity analysts typically form a specific expertise in the critical infrastructure area that they work in. This is important because the tools,…
Articles on cyber policy.
Cybersecurity analysts typically form a specific expertise in the critical infrastructure area that they work in. This is important because the tools,…
Two sides are battling for your mind and soul on the Internet. It is also a global hybrid conflict we are facing.…
The Annual Report issued by the European Union’s (EU) Network and Information Security Agency (ENISA) has recently been released for patterns observed…
Editors Note: On occasion I go back and reread some of my earlier articles to guage how my own views are changing.…
The information sharing communities of Europe and the United States will both be converging during two separate and concurrent meetings in Rome,…
The cyber landscape presents an existential risk to the West! In labeling the cyber threat existential, my underlying premise must be stated:…
In Part 1, I asserted that the reverse market forces at play in the cyber landscape (i.e., unchecked monetization of cybercrime) would…
Sitting at a National War College event in Colorado Springs recently, attending a forum of thought leaders addressing a Public-Private Partnership model…
H.R. 624 is currently being considered by Congress for enhancing Cybersecurity Intelligence Sharing. The bill passed the House April 18, 2013, and…
Small and medium-sized enterprises in the DOD supply chain have some work cut out for them to come into compliance with recent…