Walid Al-Saqaf Richard Barnes Gonzalo Camarillo Olga Cavalli Hans Peter Dittler Hiroshi Esaki Mike Godwin John Levine Glenn McKnight Robert Pepper Andrew Sullivan Sean Turner Mieke van Heesewijk These are the names and links to profiles of the Board of Trustees for the Internet Society (as of this date in November 2019). According to their dot […]
The Traffic Light Protocol (TLP) takes something that most people know and applies it to a new problem. In this case the simple concept of roadway traffic lights applied to information sharing. As defined by FIRST, an organization formed by cyber first responders; the Traffic Light Protocol is "a set of designations used to … Continue reading Understanding the Traffic Light Protocol (TLP)
OK. Once you've downloaded Ubuntu the next decision will be where to install it. My suggestion is go virtual. I run Linux on my corporate laptop and on my personal iMac; both using VMware Fusion. As of this writing I am running v8.5 and the current version for Mac is v10. The other way of … Continue reading Getting Virtually Started
One of the modern corporate technology problems I used to deal with almost every working day was the screen saver settings on my corporate laptop. The corporate security team has done an amazing job of locking my PC down and making it safe. The down side of that is that they control the screen saver … Continue reading Getting Jiggler with it….
The Internet is changing yet again. One of my predictions for 2018 is that everyone will witness a migration from corporate or private data centers to the 'Cloud', or Internet hosted data centers. There have been tremendous advances made in both securing the Cloud and sharing with the broader technical community how to secure the … Continue reading It all in the Cloud(s)
I just finished the course 'International Cyber Conflicts' at Coursera. The course was developed and led by professors Sanjay Goel and Kevin Williams from the State University of New York at Albany. This was a five week course that consisted of recorded presentations with inline questions; discussion forums; and end of week quizzes. The presentations … Continue reading International Cyber Conflicts @ Coursera
I recently came across two very good articles about USB forensics. The Hitchhiker's Guide to USB Forensics was published at the Cyberforensicator site by Oleg Skulkin and Igor Mikhaylov. It is a very well thought out an written description of how to find out by operating system analysis what files have been copied to a USB … Continue reading USB Forensics
Today the New York Times Opinion pages offered an editorial titled 'Combating the Real Threat to Election integrity'. Authored by the Times Editorial Board the essay has two faults. One is that it continues to pile on the story that the Russian Government is responsible for cyber attacks aimed at the United States electoral system. … Continue reading Understanding the Real Threat (NY Times Editorial)
Many would consider me an Internet old timer. I used 'The Internet'; then ARPAnet back in the days when I worked as a Software Engineer for a US defense contractor. Securing communications and having confidence in message integrity; both in the identity of the sender and in the integrity in the content have always been … Continue reading The State of Internet Privacy? In Shambles. Moving on.
Thoughts about an interesting article that appeared in today's New York Times about the use of cellphone numbers.