Bill Weber

If everyone is thinking alike, then somebody isn't thinking.

  • Blog
  • Projects
  • Resume

Bill Weber

Do Not Fail Cartoon

Who Owns Cyber Security Risk?

July 5, 2022

As Chief Information Security Officers, we are often asked to resolve this question. After all, the CISO is responsible for the policies and capabilities of the cyber defense of the organization. But as organizations grow into their Cyber Security awareness, it is often the case that the individual lines of business begin to recognize that it is their bottom line that is impacted – both by good and bad security.

Is the Government Behaving like a Startup?

Is the Government behaving like a Startup

June 4, 2022

The Government Services Organization has a team of outsiders called 18F. It emerged from President Obama’s Presidential Innovation Fellows (PIF) program that brings outsiders into government to handle some of its most challenging problems. The team focused on this problem and believes it can get the 6 month process down to 30 days.

City Scape

Is Crypto Economics about Fiat or Fluidity?

June 3, 2022

Crypto Coins have taken a recent tumble in the markets as traded against Fiat currencies, and it has caused a lot of noise about the future and value of the technology. So, let’s talk about the actual value of Block Chain and, more importantly, where this all must go from here.

What MITRE ATT&CK tells us about prioritizing mitigations

May 23, 2022

defenders use a framework like MITRE ATT&CK when attackers don’t?” The reality of this is that cyber criminals are lazy and only when the easy thing doesn’t work will they find more inventive ways to breach our defenses.

Robot

NOVA Lab: Rancher Cluster Part 1: Virtual Machine Setup

May 17, 2022

Today’s project is to install Rancher ahead of getting my new RPI and MiniPC Cluster online. To start this project, I’m going to use…

Robot

NOVA Lab: PIHole & Ansible

May 15, 2022

So today I’m setting out to recreate my home lab.Here is a quick view of the resources I’m restructuring. While eventually, I want to…

Crowd of people in a small space represented with emoticons

The Future of SCAP is the missing GAP in OSCAL

May 13, 2022

Certainly, in CyberSecurity, it can seem like that. This is especially true when new ideas emerge so quickly that current projects languish and eventually become lost in the pile of unmaintained code.

Tired of Following the Compliance Herd?

May 1, 2022

If the idea of following the industry standard of care for your IT projects is offensive to you, there is some good news.

Facial Matching and Identity Verification

February 23, 2022

So much has been written in the last few days about using facial matching for identity verification. But did we (the industry) get it…

Starry Starry Night

Novel Applications for Ethereum ERC-721 Non-Fungible Tokens

October 15, 2020

Since the introduction of blockchain technology, several of the key applications have been in creating digital currency. Understandable as the key features of non-repudiation and distributed ledger are both desirable aspects of a monetary system.

Posts pagination

Previous 1 2 3 4 Next

Recent Posts

  • NIST SP800-171Ar3
  • Picking Locks with Mensa AG 2025
  • Inference Compute and Multimodal Knowledge
  • BSides Bloomington
  • How SON’s Z-Axis Preserves Privacy: Enabling Global Models with Local Knowledge
Copyright Bill Weber. All rights reserved. | Theme by SuperbThemes