Academia, Research, Uncategorized

“To report or not to report? Extending Protection Motivation Theory to Vulnerability Discovery and Disclosure” accepted for publication at Computers & Security

I've been working with Amy Woszczynski and DJ Oliver on a study that is near and dear to my heart due to my personal experiences in the area of interest. This week, we were informed that our study had been accepted for publication in "Computers & Security," an A-level journal on the Australian Business Deans… Continue reading “To report or not to report? Extending Protection Motivation Theory to Vulnerability Discovery and Disclosure” accepted for publication at Computers & Security

Research, Tips

Importing OVA into Amazon AWS

While working on a project, I needed to be able to import OVAs into my Amazon AWS account for use in various ways. What I discovered is that Amazon's documentation on this process is rather... dense and confusing. I spent a good amount of time trying to decipher what the documentation was actually telling me… Continue reading Importing OVA into Amazon AWS

Research

Converting VM images to Docker containers

I'm starting to experiment with Docker containers. From a pedagogical perspective, I see lots of opportunities to quickly and easily script environments to support hands-on lab objectives for my students. Being able to create a series of images, push them to a public Docker repo, and then store a Docker compose script in a Github… Continue reading Converting VM images to Docker containers

Analysis, Legislation

A quick analysis of Georgia HB 134 and HB 156

During the 2021 legislative session, the Georgia Assembly passed two bills related to cybersecurity that warrant some discussion and analysis. HB 134 (https://www.legis.ga.gov/legislation/59005) is sitting on Governor Kemp's desk and has not yet been signed into law. The bill is designed to carve out exemptions from open meeting requirements and public records requests related to… Continue reading A quick analysis of Georgia HB 134 and HB 156

Analysis

Quick thoughts about the SolarWinds breach

Over the weekend, SolarWinds announced a significant breach.  SolarWinds is a suite of tools that allows firms to manage and monitor their systems and networks.  SolarWinds says it provides services to: More than 425 of the US Fortune 500All ten of the top ten US telecommunications companiesAll five branches of the US MilitaryThe US Pentagon,… Continue reading Quick thoughts about the SolarWinds breach