Evaluating tor and other anonymizing security tools
Last October I wrote several blogs on differences between the Surface Web, the Deep Web and the Dark Web. Essentially, The Deep Web is comprised of...
The Hacking-Cyberwar Continuum, Part III
So far, no act of cyber incursion/aggression has yet filled all of Carl von Clausewitz's classic criteria for war as "violent, instrumental, and political." While a full-scale...
The Sony attack is a wakeup call
Fallout from the Sony security debacle continues. This, combined with the myriad other security threats I've been discussing in blogs this year, are...
Leveraging social media to grow your business, Part II
The Digital Revolution has affected our ideas about time, space and social relationships. Businesses need to stay abreast of rapidly increasing tech breakthroughs that are...
Benefits of social media networking
Online networking websites allow you to connect Networking via the Internet has mushroomed in recent years with the explosive growth of social...