In a recent newsletter, The Institute for Human and Machine Cognition (IHMC) published an article about research they are doing with the military, tactical communications, and agile computing . I'd like to share the newsletter and a few thoughts.
Information Dominance is indispensable to our Navy, enabling the Navy to fight and win today, while ensuring the ability to win tomorrow. It is imperative that we embrace Navy Information Dominance.
- Navy Strategy for Achieving Information Dominance 2013-2017
Thursday, August 22, 2013
Tactical Communications Demand Adaptive Software
In a recent newsletter, The Institute for Human and Machine Cognition (IHMC) published an article about research they are doing with the military, tactical communications, and agile computing . I'd like to share the newsletter and a few thoughts.
Wednesday, August 21, 2013
A reflection on almost 30 years in computing
As I approached the age of 40, I began to reflect on the almost 30 years I have been using computers (20 of which have been full-time in the IT industry). I enumerated, in my head, the things I have seen and done in during this time. I'd like to share a few with you.
Labels:
history
Thursday, August 15, 2013
Wednesday, August 14, 2013
Tuesday, August 13, 2013
IA Must be Easy
In the early 2000's, illegal acquisition of music was rampant. These things called MP3's were shared between computers through physical connections like CD's as well as the virtual, like torrents on the Internet. You know who solved the problem, though?
Apple.
And you know how they solved it?
Monday, August 12, 2013
Cyber Kill Chain: Hope or Hype?
Cyber Kill Chain: Hope or Hype?
The concept of a Cyber Kill Chain was adopted from the military kill chain concept, which describes the stages of an attack. As you might guess, a cyber kill chain does just that, but for cyber attacks. This post will discuss some of the practical issues you will need to consider if you want to implement your own cyber kill chain.
Labels:
APT,
CTN,
cyber,
cyber kill chain,
DDoS,
hacking,
information warfare,
IPS,
log data,
SIEM
Thursday, August 8, 2013
Reducing Risks Through Informed Security Control Selection
Risk Management is not about the
number of security controls chosen, but about the security controls well
chosen. The Joint Task Force
Transformation Initiative describes a risk management process
made up of four steps: frame, assess, respond, and monitor.1 This represents an effective way of making
sure that due diligence is used in the risk management, and ultimately control
selection process.
Tuesday, August 6, 2013
Notes: One Sheet
I have seen a few articles recently that all talk about the art and value of taking notes. And this is my response to 99u's poll of, "What's your note-taking system?"
In our masses-of-information-at-your-fingertips type of world we live in, I am a big proponent of taking notes. And one of my favorite ways to take notes is by what I like to call ... One Sheet.
It is very important how we present information to both friends and foes alike. When we want the information to be read, we must keep it simple, clean, and accessible.
Monday, August 5, 2013
Help! I want to do Cyber but I don't have a technical degree
Do you need a technical degree in order to work in cyber security? Not really.
As a Navy Reserve Information Warfare Officer (IWO), I recently attended the 2-month long Information Warfare Basic Course (IWBC) at Corry Station, Pensacola Florida. The course aims to provide basic instruction to active duty and reserve IWO's in the all things IW. Cyber was one of the topics of instruction. Some of the officers in the course transfer from different Navy communities into IW. These folks tend to have a mix of technical and non-technical undergraduate degrees. Unless you have been living in a cave for the last several years, cyber is a really hot topic right now, both in the Department of Defense (DoD) and in the private sector. Naturally, some of the officers in class were concerned that their liberal arts degrees would keep them from participating in cyber operations. This is not necessarily the case, and I'd like to share my thoughts on how one can bolster their resume to be more attractive in this area. I believe my thoughts can be applied to both to the military and civilian worlds.
Friday, August 2, 2013
Subscribe to:
Posts (Atom)