Quantcast
Channel: CISO LABS
Browsing latest articles
Browse All 10 View Live

Image may be NSFW.
Clik here to view.

My Information Security History – Part 1 – Information Assurance

Looking back on my experience; I am trying to chronicle my information security experience using a retrospective vantage point — it’s amazing how far I’ve come in this space. Throughout my experience...

View Article



Image may be NSFW.
Clik here to view.

My Information Security History – Part 2 – Network Security

Over the past 15 years I have been actively working in the area of information technology. My fascination with technology has made me a very successful man and has presented me with many challenges,...

View Article

Image may be NSFW.
Clik here to view.

My Information Security History – Part 3 – Object Oriented Programming

During my 15 years of managing, implementing, troubleshooting and maintaining information systems I have acquired multiple skills relating to programming and have fostered a good understanding about...

View Article

Image may be NSFW.
Clik here to view.

My Information Security History – Part 4 – Operating Systems (Primer)

Can be used as a primer — maybe? Throughout my 15 year career I have worked in many heterogeneous multi-platform, multi-protocol environments. Every aspect of my career is deeply rooted in technology...

View Article

Image may be NSFW.
Clik here to view.

Research Paper – Business Data Communication

With the need for information spanning global markets and the interdependence of countries, governments and businesses, communication remedies the speed and need for information. Businesses are no...

View Article


Image may be NSFW.
Clik here to view.

Research Paper – Computer Operating Systems

Missing operating system_ {error message} (Photo credit: quapan) Del Addison CISO LABS — Draft Research Paper 2007 on Computer OSes Computers have perpetually revolutionized the way we communicate,...

View Article

Image may be NSFW.
Clik here to view.

Information Security Framework

Simplified Information Security Framework The information security framework is an aggregate of policies, procedures, guidelines, and organizational structures that stipulate how the organization...

View Article

Image may be NSFW.
Clik here to view.

FBI requests $41 million to battle ‘wiretap unfriendly’ online correspondence

Reblogged from TheConfirmationFiles: In an attempt to bring law enforcement capabilities up to speed with current communication techniques, the FBI has requested an additional $41 million from the...

View Article


Image may be NSFW.
Clik here to view.

In a Cyber War Is It OK to Kill Enemy Hackers? | Endless Innovation | Big Think

Reblogged from geistwc: In a Cyber War Is It OK to Kill Enemy Hackers? | Endless Innovation | Big Think. Good question -- out of frustration I think kinetic attacks where human lives are lost in the...

View Article


Image may be NSFW.
Clik here to view.

Sanctions are a form of Cyber Attack (it’s the social attack vector)

Proof that no country is an island and we are a global economy – North Korea has being doing some posturing lately and largely enough this is because they simply want to have their cake and eat it too–...

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images