Posts

Enterprise Log Management: An Overview (Part 1)

/
Enterprise Log Management: An Overview (Part 1)

THE IMPACT OF FEDERAL REGULATIONS ON THE INFORMATION ASSURANCE OF THE NORTH AMERICAN ELECTRICAL ENERGY GRID Part 2 of 2

/
Part II THE IMPACT OF FEDERAL REGULATIONS ON THE INFORMATION ASSURANCE OF THE NORTH AMERICAN ELECTRICAL ENERGY GRID

A Book Review of “Penetration Testing: A Hands-On Introduction to Hacking” by Georgia Weidman (@georgiaweidman)

/
A Book Review of “Penetration Testing: A Hands-On Introduction to Hacking”

The Internet of Toys and Games by @mhbjr for My Security Thoughts

/
Will law enforcement now send subpoenas for the audio and video recordings from Barbie? Will Mattel be subjected to National Security Letters?

My Security Thoughts by @mhbjr

/
my current thoughts are on how cyber security is affected or will be affected by the automation and religion

Former Anonymous hacker doubts North Korea behind Sony attack

/
Former Anonymous hacker doubts North Korea behind Sony attack