Posts

Enterprise Log Management: An Overview (Part 1)
/
0 Comments
Enterprise Log Management: An Overview (Part 1)

THE IMPACT OF FEDERAL REGULATIONS ON THE INFORMATION ASSURANCE OF THE NORTH AMERICAN ELECTRICAL ENERGY GRID Part 2 of 2
Part II THE IMPACT OF FEDERAL REGULATIONS ON THE INFORMATION ASSURANCE OF THE NORTH AMERICAN ELECTRICAL ENERGY GRID

THE IMPACT OF FEDERAL REGULATIONS ON THE INFORMATION ASSURANCE OF THE NORTH AMERICAN ELECTRICAL ENERGY GRID Part 1 of 2
THE IMPACT OF FEDERAL REGULATIONS ON THE INFORMATION ASSURANCE OF THE NORTH AMERICAN ELECTRICAL ENERGY GRID

A Book Review of “Penetration Testing: A Hands-On Introduction to Hacking” by Georgia Weidman (@georgiaweidman)
A Book Review of “Penetration Testing: A Hands-On Introduction to Hacking”

The Internet of Toys and Games by @mhbjr for My Security Thoughts
Will law enforcement now send subpoenas for the audio and video recordings from Barbie? Will Mattel be subjected to National Security Letters?

My Security Thoughts by @mhbjr
my current thoughts are on how cyber security is affected or will be affected by the automation and religion

A Cyber-Security Summary of the President’s State of the Union Address
A Cyber-Security Summary of the President’s State of the Union Address

Complementing a Security Management Model with the 20 Critical Security Controls
Complementing a Security Management Model with the 20 Critical Security Controls

Former Anonymous hacker doubts North Korea behind Sony attack
Former Anonymous hacker doubts North Korea behind Sony attack