Toolbox: After a Conference
How to get back into the workflow after time away at conferences.
How to get back into the workflow after time away at conferences.
Reminders about some conference best practices.
What have we learned and what steps can we take?
A paper at the Workshop on the Economics of Information Security titled “Valuing CyberSecurity Research Datasets” focuses on the value of the IMPACT data sharing platform at DHS, and how the availability of data shapes research.
Today is the 50th Anniversary of ‘One small step for a man, one giant leap for mankind.’
Some books worth reading, particularly related to space and history
Discussing online conflict on the AppSec Podcast
Mitigating the Risk of Software Vulnerabilities by Adopting a Secure Software Development Framework (SSDF) from NIST is open for comment.
Let’s explore the risks associated with Automated Driving.
The road to mediocre writing is paved with over-simplification and distraction.
When was the last time you looked over what our country was founded upon?
When was the last time you looked over what our country was founded upon?
Bruse Marshall has put together a useful comparison of password requirements from OWASP ASVS v3 and v4.
Juneteenth is the celebration of the end of slavery in the US. We should have more holidays that celebrate freedom for the sake of freedom.
I'm happy to say that some new research by Jay Jacobs, Wade Baker, and myself is now available, thanks to the Global Cyber Alliance.