- Eagle Business Solutions, Peak Resource Group, DMR TRECOM, AT&T, US Air Force
- Attended University of Maryland, College Park
Vulnerability Summary for the Week of October 19, 2015 | US-CERT
Source: Vulnerability Summary for the Week of October 19, 2015 | US-CERT National Cyber Awareness System: SB15-299: Vulnerability Summary fo
Police Want Genetic Data from Corporate Repositories - Schneier on Security
As NYU law professor Erin Murphy told the New Orleans Advocate regarding the Usry case, gathering DNA information is "a series of totally re
Stop.Think.Connect. Parent and Educator Resources | Homeland Security
Source: Stop.Think.Connect. Parent and Educator Resources | Homeland Security Stop.Think.Connect. Parent and Educator ResourcesWhen your chi
The Impact of the End of Windows XP on Your Enterprise
It wasn't all that long ago that Windows XP was present in the vast majority of enterprises. In fact, it's still prevalent, bringing many se
Essays: Quantum Cryptography: As Awesome As It Is Pointless - Schneier o...
Quantum Cryptography: As Awesome As It Is Pointless. Bruce Schneier; Wired; October 16, 2008. Quantum cryptography is back in the news, and
Blackmail, Deletion Offers Hit Ashley Madison Users
Users on the Ashley Madison list have received various threats that are aimed at further exploting them.
What Can you Learn from Metadata? - Schneier on Security
What Can you Learn from Metadata? An Australian reporter for the ABC, Will Ockenden published a bunch of his metadata, and asked people to d
Essays: It's Time to Break Up the NSA - Schneier on Security
It's Time to Break Up the NSA. Bruce Schneier; CNN; February 20, 2014. The NSA has become too big and too powerful. What was supposed to be
HAMMERTOSS: New Russian Malware - Schneier on Security
The Hammertoss backdoor malware looks for a different Twitter handle each day -- automatically prompted by a list generated by the tool -- t
Human and Technology Failures in Nuclear Facilities - Schneier on Security
We can learn a lot about the potential for safety failures at US nuclear plants from the July 29, 2012, incident in which three religious ac
10 Convenient Ways to Increase Your Mobile Application Security Knowledge
Here are 10 resources that will help professionals improve their knowledge and understanding of the state of mobile application security.
New Research: The Best Time to Tweet for Clicks, Retweets, and Replies
We looked at 4.8 million tweets sent through Buffer to determine the most popular times to tweet and the best times for clicks, retweets, an
Breach Defense Playbook: Incident Response Readiness (Part 2) - Dark Rea...
Will your incident response plan work when a real-world situation occurs?