Date Author Title
2023-01-11Jan KoprivaPassive detection of internet-connected systems affected by vulnerabilities from the CISA KEV catalog
2021-12-17Rob VandenBrinkDR Automation - Using Public DNS APIs
2021-08-19Johannes UllrichWhen Lightning Strikes. What works and doesn't work.
2020-12-22Xavier MertensMalware Victim Selection Through WiFi Identification
2020-07-25Didier Stevensndisasm Update 2.15
2015-02-09Chris MohanBackups are part of the overall business continuity and disaster recovery plan
2014-11-24Richard PorterSomeone is using this? PoS: Compressor
2013-05-21Adrien de BeaupreMoore, Oklahoma tornado charitable organization scams, malware, and phishing
2013-01-18Russ McReeInteresting reads for Friday 18 JAN 2013
2011-11-15Adrien de down?
2011-06-17Richard PorterWhen do you stop owning Technology?
2011-06-04Rick WannerDo you have a personal disaster recovery plan?
2010-08-03Johannes UllrichWhen Lightning Strikes
2010-04-27Rob VandenBrinkLayer 2 Security - L2TPv3 for Disaster Recovery Sites
2010-04-22Deborah HaleHow McAfee turned a Disaster Exercise Into a REAL Learning Experience for Our Community Disaster Team
2010-04-04Mari NicholsFinancial Management of Cyber Risk
2009-03-26Mark HofmanSanitising media
2009-02-12Mark HofmanAustralian Bushfires
2008-08-10Stephen HallFrom lolly pops to afterglow
2008-07-14Daniel WesemannDR/BCM lessons from the Vancouver fire
2008-06-13Johannes UllrichFloods: More of the same (2)
2008-05-26Marcus SachsPredictable Response
2008-05-17Jim ClausingDisaster donation scams continue