Trusting
Encryption Supply Chains (July 25, 2023)
Orderly Shutdown Should be First Priority
(May 16, 2023)
Worldwide Broadband Vulnerabilities
(October 6, 2022)
Public Health Endangered by Deficient Use Models and
Insufficient Applications
(January 25, 2021)
Journey into Peril: Rolling Your Own Security and Access Control (October 5, 2020)
Remote Security in Times of Expansion (March 16, 2020)
Dealing with SPAM Calls (April 24, 2019)
The WebSocket Protocol -- Past Travails Are To Be Avoided (March 23, 2011)
Dangerous Assumptions:
Solid-State Disk Behavior Underlying Digital Forensics (March 6, 2011)
Electronic Discovery and Digital Forensics: The Applications Front (February 28, 2011)
Colliding Worlds:
Juries in the World of Pervasive Connectivity and Social Media
(February 9, 2011)
Saas:
Accountability Can Get Lost; Not Liability (January 10, 2011)
Searching
for Airline Security, Part Deux (November 26, 2010)
Searching
for Airline Security (November 22, 2010)
Reconnaissance Gone Retail and Security: A Challenging Duality
(November 2, 2010)
Google Street View and Unencrypted Wi-Fi: Not a Hazard
(October 25, 2010)
Comments to the IRS Counsel: Impact of Sec. 6041 Changes
(September 28, 2010)
GPS Recorders and Law Enforcement Accountability
(August 31, 2010)
Disposable Virtual Machines: Deliberately Expendable
(August 23, 2010)
Expanded
Forms 1099-MISC Reporting: A Pilot Demonstration
(June 21, 2010)
For the Commissioner: Invoices as Substitute Forms W-9
(June 14, 2010)
New IRS
Reporting Requirements Have Implications for Businesses Large and Small
(May 25, 2010)
Why Settle on a Hosting Provider?
Bandwidth liquidity and other issues
(May 12, 2010)
Please Do Not Spare the Parentheses
(March 2, 2010)
Emergency Procedures: For Driving and Other Purposes
(February 8, 2010)
Bricks and Mortar Hidden by Cyberspace
(December 21, 2009)
Networks Placed at Risk – By Their Providers (December 7, 2009)
The Silence of Censorship
(November 24, 2009)
Vanishing E-mail and Electronically Stored Information:
An E-Discovery Hazard (July 31, 2009)
Governor Mark Sanford Email Disclosure: An ECPA Violation?
(June 26, 2009)
Micro-blogging and Personal Self-Surveillance
(June 25, 2009)
Corporate Tool: Mobile WiFi Hybrids
(May 8, 2009)
The Need for Backup
(May 5, 2009)
Will Long Term Dynamic Address Allocation Record Retention
Help or Hurt?
(March 31, 2009)
Computer Security Handbook, 5th Edition Released
(March 18, 2009)
Presentation Announcement: What to do when There is a problem?
(February 20, 2009)
Securitization: A Risk to Compliance Integrity
(January 21, 2009)
|