Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
How InfoSec Security Controls Create Vulnerability
One frequent reality in many intrusions is that attackers don’t target the data they are...
Date: 02/20/2016
Defenders think in lists. Attackers think in graphs. As long as this is true, attackers win.
Defender Mindset A lot of network defense goes wrong before any contact with an adversary, starting...
Date: 04/26/2015