Let’s have one. Yeah.
Your email address will not be published. Required fields are marked *
Save my name, email, and website in this browser for the next time I comment.
You can reply on your own site using Trackback, Pingback, or Webmention. If your site doesn't support these technologies, manually put the URL of your reply (which must contain a link to this page) below:
Schneier proposes a model to apply the cybersecurity kill chain to the problem of thwarting information operations of the types…
To help him get around the Free Fringe in Edinburgh this year, Dan's made a map of all of the…
JTA and Dan would be friends anyway, but having a partner-in-common has given them the opportunity to be closer still.…