Thursday, August 22, 2013

Tactical Communications Demand Adaptive Software


In a recent newsletter, The Institute for Human and Machine Cognition (IHMC) published an article about research they are doing with the military, tactical communications, and agile computing . I'd like to share the newsletter and a few thoughts.


Wednesday, August 21, 2013

A reflection on almost 30 years in computing

As I approached the age of 40, I began to reflect on the almost 30 years I have been using computers (20 of which have been full-time in the IT industry). I enumerated, in my head, the things I have seen and done in during this time. I'd like to share a few with you.

Thursday, August 15, 2013

Wednesday, August 14, 2013

Tuesday, August 13, 2013

IA Must be Easy


In the early 2000's, illegal acquisition of music was rampant.  These things called MP3's were shared between computers through physical connections like CD's as well as the virtual, like torrents on the Internet.  You know who solved the problem, though?

Apple.

And you know how they solved it?

Monday, August 12, 2013

Cyber Kill Chain: Hope or Hype?



Cyber Kill Chain: Hope or Hype?

The concept of a Cyber Kill Chain was adopted from the military kill chain concept, which describes the stages of an attack. As you might guess, a cyber kill chain does just that, but for cyber attacks. This post will discuss some of the practical issues you will need to consider if you want to implement your own cyber kill chain.

Thursday, August 8, 2013

Reducing Risks Through Informed Security Control Selection

Risk Management is not about the number of security controls chosen, but about the security controls well chosen.  The Joint Task Force Transformation Initiative describes a risk management process made up of four steps: frame, assess, respond, and monitor.1  This represents an effective way of making sure that due diligence is used in the risk management, and ultimately control selection process.  

Tuesday, August 6, 2013

Notes: One Sheet


I have seen a few articles recently that all talk about the art and value of taking notes.  And this is my response to 99u's poll of, "What's your note-taking system?"

In our masses-of-information-at-your-fingertips type of world we live in, I am a big proponent of taking notes.  And one of my favorite ways to take notes is by what I like to call ... One Sheet.

It is very important how we present information to both friends and foes alike.  When we want the information to be read, we must keep it simple, clean, and accessible.

Monday, August 5, 2013

Help! I want to do Cyber but I don't have a technical degree




Do you need a technical degree in order to work in cyber security? Not really.

As a Navy Reserve Information Warfare Officer (IWO), I recently attended the 2-month long Information Warfare Basic Course (IWBC) at Corry Station, Pensacola Florida. The course aims to provide basic instruction to active duty and reserve IWO's in the all things IW. Cyber was one of the topics of instruction. Some of the officers in the course transfer from different Navy communities into IW. These folks tend to have a mix of technical and non-technical undergraduate degrees. Unless you have been living in a cave for the last several years, cyber is a really hot topic right now, both in the Department of Defense (DoD) and in the private sector. Naturally, some of the officers in class were concerned that their liberal arts degrees would keep them from participating in cyber operations. This is not necessarily the case, and I'd like to share my thoughts on how one can bolster their resume to be more attractive in this area. I believe my thoughts can be applied to both to the military and civilian worlds.

Friday, August 2, 2013