- Eagle Business Solutions, Peak Resource Group, DMR TRECOM, AT&T, US Air Force
- Attended University of Maryland, College Park
Stop.Think.Connect. Parent and Educator Resources | Homeland Security
Source: Stop.Think.Connect. Parent and Educator Resources | Homeland Security Stop.Think.Connect. Parent and Educator ResourcesWhen your chi
The Impact of the End of Windows XP on Your Enterprise
It wasn't all that long ago that Windows XP was present in the vast majority of enterprises. In fact, it's still prevalent, bringing many se
Essays: Quantum Cryptography: As Awesome As It Is Pointless - Schneier o...
Quantum Cryptography: As Awesome As It Is Pointless. Bruce Schneier; Wired; October 16, 2008. Quantum cryptography is back in the news, and
Blackmail, Deletion Offers Hit Ashley Madison Users
Users on the Ashley Madison list have received various threats that are aimed at further exploting them.
What Can you Learn from Metadata? - Schneier on Security
What Can you Learn from Metadata? An Australian reporter for the ABC, Will Ockenden published a bunch of his metadata, and asked people to d
Essays: It's Time to Break Up the NSA - Schneier on Security
It's Time to Break Up the NSA. Bruce Schneier; CNN; February 20, 2014. The NSA has become too big and too powerful. What was supposed to be
HAMMERTOSS: New Russian Malware - Schneier on Security
The Hammertoss backdoor malware looks for a different Twitter handle each day -- automatically prompted by a list generated by the tool -- t
Human and Technology Failures in Nuclear Facilities - Schneier on Security
We can learn a lot about the potential for safety failures at US nuclear plants from the July 29, 2012, incident in which three religious ac
10 Convenient Ways to Increase Your Mobile Application Security Knowledge
Here are 10 resources that will help professionals improve their knowledge and understanding of the state of mobile application security.
New Research: The Best Time to Tweet for Clicks, Retweets, and Replies
We looked at 4.8 million tweets sent through Buffer to determine the most popular times to tweet and the best times for clicks, retweets, an
Breach Defense Playbook: Incident Response Readiness (Part 2) - Dark Rea...
Will your incident response plan work when a real-world situation occurs?
Encrypting Windows Hard Drives - Schneier on Security
Encrypting Windows Hard Drives. Encrypting your Windows hard drives is trivially easy; choosing which program to use is annoyingly difficult
Research on The Trade-off Between Free Services and Personal Data - Schn...
New Annenberg survey results indicate that marketers are misrepresenting a large majority of Americans by claiming that Americas give out in
Hacked data on millions of US gov't workers was unencrypted | Computerworld
Massive breach of government data said to expose personal information on millions