ARPANET Maps

| | history, military, Tech History
Here is a set of geographical maps of the ARPANET in the 1970s and 1980s. There is also one “logical” map that focuses more on which host computers were connected where. The ...
alternatives to password protection

World Password Day 2023: Why we need a password-less future

If you’ve read part one, you’ll know that there’s a persistent problem with passwords. Despite the continued warnings, data breaches and endless guidance – weak and easily hackable passwords still guard a ...
Mike Murray security visibility

Let’s Do Something Worthy of Mike Murray

Mike Murray By now, everyone who knew him—and even those who did not—know that we lost a giant in the security world last week; our friend Mike Murray. There have been some ...
Security Boulevard
Mercury 7 [Friendship 7 with John Glenn Aboard] Launch Anniversary

Mercury 7 [Friendship 7 with John Glenn Aboard] Launch Anniversary

Astronaut John Glenn. On Feb. 20, 1962, 58 years ago today, Glenn (then, a Lieutenant Colonel in the United States Marine Corps) was hurled into space aboard the NASA Mercury Atlas (MA-6) ...
Tornados, Necessity, and the Evolution of Mitigating Controls

Tornados, Necessity, and the Evolution of Mitigating Controls

According to the National Oceanic and Atmospheric Administration (NOAA), a tornado (also called a twister, whirlwind, or cyclone) is a violently rotating column of air that extends from a thunderstorm and comes ...
EH-Net - Cyber Security FUD - Ullman - Stranger Things Mind Slayer

Cyber Security FUD – Fear and the Growth of the InfoSec Industry

How many times have you read marketing propaganda for information security products that includes slogans that sound like the following? “Find out what’s lurking inside your system.”[1] “With network security, if you’re ...