Today, I will discuss how the failure to leverage strategic scenario planning led to the rapid decline of Wang Laboratories…
I have discussed the Integrated Adaptive Cyber Defense (IACD) from Johns Hopkins University Applied Physics Lab (JHU-APL) in previous posts.…
The Bombing of the Marine Barracks in Beirut A Lesson for America and a Lesson for Terrorists In 1982, the…
New techniques, referred to as moving target defense (MTD), seek to diversify the critical components of homogeneous information systems environments…
Threats Threats are potential causes of harm that could affect the confidentiality, integrity, or availability of systems or data [1]. Organizations face…
Today’s cyber defenders find themselves at a disadvantage despite technological advances in cyber defense. Among the chief causes of this…
Welcome to Show Me Cybersecurity. In this blog, I will focus on cybersecurity including automation and innovation. Much of what…