The internet must controlled nationally based on the laws of the land. And as any asset need Identity control and monitoring. We must Protect our borders
The fediverse (often referred to as just fedi) is a collection of social networking services that can communicate with each other (formally known as federation) using a common protocol.
Performing the usual power tests and spurious emissions provided enough results to show that TIDRadio are serious about making quality and legal radios for us amateurs to use on air.
The AIS community includes private sector entities; federal agencies; state, local, tribal, and territorial (SLTT) governments; information sharing and analysis centers (ISACs) and information sharing and analysis organizations (ISAOs); and foreign government partners and companies.Β Β
Automated Indicator Sharing (AIS) is a service the Cybersecurity and Infrastructure Security Agency (CISA) provides toΒ enablereal-time exchange of machine-readable cyber threat indicators and defensive measures between public and private-sector organizations.
Bill of Rights Day We need to celebrate this day now because those rights are vanishing fast. Just like the in God We Trust on our money may die soon. danwillie
SANS has been around since AL Gore invented the Internet. I spent many hours reading their materials in the past. Below is a list of courses. There is no one more knowledgeable.
An interesting side note in my use of Microsoft Edge to write this post. six times in 20 minutes it closed for no reason. It's a bit eerie, but I do believe monitoring of some kind is happening. No matter, we are in that age of a new world where privacy is of the past.
The Internet is ones and zeros, but the uses and purpose of those ones and zeros makes all the difference in the World. This deal with the devil shows Ethics prevailing.
The DHS Intel app, available to all Homeland Security Information Network β Intelligence (HSIN-Intel) members, enables users to view and search for intelligence information, receive alerts when new products are available, and bookmark products for future reference
The PCII marking remains until either the PCII Program Office determines the information no longer qualifies for PCII protection or the submitter requests the removal of protections. PCII is normally labeled with the following statement by the PCII Program Office to ensure the material is safeguarded and handled appropriately.
Twitterβs Back-4USCyber back to life Today- The end of 2022 New life into Old site. #MarkZuckerberg envisioned 2022 as a turning year for his #metaverse project β it was not. What went wrong? Other players New ownership of Twitter- Elon Musk and with that 4USCyber back to life. CyberNews is a good source Check these
Not Russia Russia Russia but Equifax Breach by Chinese hackers We have heard so much from the left itβs all Russia. Well, this Equifax Breach by Chinese hackers has been going on for two years and is far greater than anything in Russia. Glad the FBI and DOJ have continued to investigate this instead of
Earlier this year, Microsoft management split the Windows division in half, moving Windows engineering into the same group as Azure engineering. It was only a matter of time until Windows and Azure would start sharing the same codenaming scheme, right? Windows update.
Put National Guard cyber-security units on standby for midterm National Elections 2020. The three states are Washington, Illinois, and, more recently, Wisconsin.
National Guard cyber teams activated for elections in these states. On election night 2020, dozens of states will have members of their National Guard cyber teams ready ...
Accounts have been allegedly blocked and deactivated & you canβt navigate through the reactivation process because it stalls even when you answer the questions correctly. #Freespeech #FREEDOMOFSPEECH #JAMESWOODS #Candaceowens #seanhannity #Trump