Building on the Legacy Cyber Kill Chain, this model includes the new Internal Kill Chain and Target Manipulation Kill Chain. This model highlights opportunities to detect and frustrate the adversary at every stage. Don’t declare “GAME OVER” just because the adversary has breached the perimeter!
A presentation at BSides Seattle 2012 providing advice for accelerating a career in information security.
A proposal for a new hash algorithm, developed at Sandia National Laboratories and submitted to the NIST SHA3 competition.
An extension of the Java BufferedReader class to prevent DoS attacks from large files with no line breaks.