Hatteras HoopsSecurity Lessons from HistoryHow Old Ideas Strengthen Modern CybersecurityNov 25, 2023Nov 25, 2023
Hatteras HoopsWhy Cyber Fails on its OwnThe Strategy of Uniqueness Wears ThinNov 18, 2023Nov 18, 2023
Hatteras HoopsHuman-Domain Security EvolutionLessons from HDS origins paint a balanced futureJul 22, 2023Jul 22, 2023
Hatteras HoopsGlobal Challenges in Securing the Human-Domain, Part IUntangling European Laws Germane to Insider Threat as Compared to the U.SJul 3, 2023Jul 3, 2023
Hatteras HoopsCould Fragmented Interwebs Threaten the Global World Ordera doom and gloom story about the Great Chinese FirewallJul 3, 2023Jul 3, 2023
Hatteras HoopsInsider Threat: Hard but not ImpossibleWhy the time is now for industry-led human-domain securityApr 14, 2023Apr 14, 2023
Hatteras HoopsWilderness of Mirrors in Cyberspace: nexus among APTsBetween at least 2017 and 2019 [1], Russian foreign intelligence service (FIS)-sponsored Advanced Persistent Threat (APT) Turla (aka…Apr 3, 2023Apr 3, 2023
Hatteras HoopsCyber Crime: Insider Fraud & Extortion — The Sharp CaseIn December 2021, The U.S. Department of Justice (DOJ) announced alleged insider computer fraud impacting a redacted New York-based…Mar 25, 2023Mar 25, 2023
Hatteras HoopsReckoning with Trust Deficits: The Role of Privacy in the Context of Information SecurityINTRODUCTION: MENDING THE LONG ARC OF THE DIGITAL AGEJan 30, 2023Jan 30, 2023
Hatteras HoopsWell-intentioned Legislators Miss the MarkThe Flawed Cybersecurity ActDec 3, 2022Dec 3, 2022