1. Dominion voting machines can access the internet. Why lie? * Aug. 11, 2021

    Dominion voting machines can access the internet. Why lie? * Aug. 11, 2021

    14
    0
    327
    2
  2. DEFINITELY not decentralized ~ NFV, SDN Humint and Humaint [bio security]

    DEFINITELY not decentralized ~ NFV, SDN Humint and Humaint [bio security]

    18
    0
    2.93K
    2
  3. Human Anomalous Health Incidents = Intra Body Communication for BAN cybersecurity on 802.15.6

    Human Anomalous Health Incidents = Intra Body Communication for BAN cybersecurity on 802.15.6

    20
    0
    2.68K
    11
  4. Neuromodulation & Cybersecurity - JWICS, SIWICS & DHS HART: Biosurveillance in 2024

    Neuromodulation & Cybersecurity - JWICS, SIWICS & DHS HART: Biosurveillance in 2024

    23
    0
    2.88K
    15
  5. Your Mobile is Leaking Location! A-GPS, SUPL, NLP to Google (and Apple) - Cybersecurity

    Your Mobile is Leaking Location! A-GPS, SUPL, NLP to Google (and Apple) - Cybersecurity

    164
    3
    1.82K
    21
  6. National Security State Censorship, Election Interference and the Inversion of Democracy

    National Security State Censorship, Election Interference and the Inversion of Democracy

    10
    0
    1.37K
  7. How Charlie Trig's Aegis Cyber Defense is Revolutionizing Cybersecurity | | Two Mikes with Dr Michael Scheuer & Col Mike | LIVE @ 7pm ET

    How Charlie Trig's Aegis Cyber Defense is Revolutionizing Cybersecurity | | Two Mikes with Dr Michael Scheuer & Col Mike | LIVE @ 7pm ET

    465
  8. CISA and USAPs - Defense information systems network Cybersecurity and infrastructure global information grid cisco control plane

    CISA and USAPs - Defense information systems network Cybersecurity and infrastructure global information grid cisco control plane

    38
    1
    4.72K
    5
  9. CISA and USAPs - Defense information systems network Cybersecurity and infrastructure global information grid cisco control plane

    CISA and USAPs - Defense information systems network Cybersecurity and infrastructure global information grid cisco control plane

    2
    0
    265
  10. What is ICS/OT Cybersecurity? | IT vs OT | OT Communication Protocols

    What is ICS/OT Cybersecurity? | IT vs OT | OT Communication Protocols

    132
  11. DEEPLY FLAWED Public Key Infrastructure (PKI) is Supposed to Secure the Internet + QA

    DEEPLY FLAWED Public Key Infrastructure (PKI) is Supposed to Secure the Internet + QA

    139
    1
    11.6K
    13
  12. Corporations Run the Internet: The Tech Company Town - Dr. Herb Lin

    Corporations Run the Internet: The Tech Company Town - Dr. Herb Lin

    14
    1
    15