Research

Converting VM images to Docker containers

I'm starting to experiment with Docker containers. From a pedagogical perspective, I see lots of opportunities to quickly and easily script environments to support hands-on lab objectives for my students. Being able to create a series of images, push them to a public Docker repo, and then store a Docker compose script in a Github… Continue reading Converting VM images to Docker containers

Analysis, Legislation

A quick analysis of Georgia HB 134 and HB 156

During the 2021 legislative session, the Georgia Assembly passed two bills related to cybersecurity that warrant some discussion and analysis. HB 134 (https://www.legis.ga.gov/legislation/59005) is sitting on Governor Kemp's desk and has not yet been signed into law. The bill is designed to carve out exemptions from open meeting requirements and public records requests related to… Continue reading A quick analysis of Georgia HB 134 and HB 156

Analysis

Quick thoughts about the SolarWinds breach

Over the weekend, SolarWinds announced a significant breach.  SolarWinds is a suite of tools that allows firms to manage and monitor their systems and networks.  SolarWinds says it provides services to: More than 425 of the US Fortune 500All ten of the top ten US telecommunications companiesAll five branches of the US MilitaryThe US Pentagon,… Continue reading Quick thoughts about the SolarWinds breach

Analysis

2020 Election rumors and facts – my analysis

I’ve spent the last few days reading lots of social media posts about things that supposedly happened, or are currently happening, as it relates to our most recent election. I thought I would try to document these claims and do some quick analysis on them.  I hope to treat this as a “living document” that… Continue reading 2020 Election rumors and facts – my analysis

Analysis, Tips

How to “hack the vote” – Georgia style

The upcoming election has already garnered a lot of attention. People are concerned about the voting process and ensuring their vote gets counted. Below are my steps for voters to "hack the vote" and verify that their vote was received and counted, following the ballot management process every step along the way. Following these steps… Continue reading How to “hack the vote” – Georgia style