443.203.9378
·
[email protected]
·
Mon - Fri 9am-5pm
Free Phone Consultation
443.203.9378
·
[email protected]
·
Mon - Fri 9am-5pm
Free Phone Consultation

By

Dondi West
Link to Department of Homeland Security Daily Cyber Reports: http://tinyurl.com/lmkxxx
Read More
Building, operating and securing the Global Information Grid (GIG) for the Department of Defense is a complex and ongoing challenge. To meet this challenge, a wide range of directives, instructions, manuals and other policies has been published. Unfortunately, the breadth and scope of these policies is such that being able to locate the appropriate policy...
Read More
Join us for a Webinar on September 23 Hear from leading social media, technology, crisis communications and health experts on quick, proven and cost-effective ways to communicate with the public, your emergency response team and government officials for seasonal flu and a potential H1N1 outbreak. Panelist include Dr. Marsha Vanderford, Director of Emergency Communication Systems,...
Read More
CyberPhunk Media, LLC has launched The Tech Zoo BLOG focused on providing technology information to investors and consumers. Missouri woman charged under the state’s new Cyber Bullying Law. Harvard Cyberlaw professor Charles R. Nesson, seeks to set a legal precedent that would protect digital file sharers from prosecution. Facebook Faces Privacy Lawsuit Wall Street Journal....
Read More
The FCC has rightfully made an inquiry into Apple’s recent banning of the Google Voice iPhone Application. FCC’s Letter to Apple –
Read More
Below is the link to a memo outlining the U.S. Navy’s creation of Fleet Cyber Command/Commander Tenth Fleet. http://tinyurl.com/lwgaf7
Read More
PLA Information Warfare Development Timeline and Nodal Analysis Zulu Meet Analyst, Verisign iDefense The development timeline is consistent with the broad contours of China’s current IW theory. It showed clearly the footprints of China’s common war preparation patterns and People’s war concept. For China, IW is a People’s War, beyond simple “hacking,” and is a...
Read More
1 17 18 19 20 21 26