<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Gerald Beuchelt&#8217;s Contraptions &#8211; Gerald Beuchelt</title>
	<atom:link href="http://beuchelt.com/blog/feed/" rel="self" type="application/rss+xml" />
	<link>https://beuchelt.com</link>
	<description></description>
	<lastBuildDate>Sun, 08 Jan 2017 16:16:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Home Cloud</title>
		<link>https://beuchelt.com/blog/2017/01/08/home-cloud/</link>
					<comments>https://beuchelt.com/blog/2017/01/08/home-cloud/#respond</comments>
		
		<dc:creator><![CDATA[Gerald Beuchelt]]></dc:creator>
		<pubDate>Sun, 08 Jan 2017 16:16:59 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Tips and Tricks]]></category>
		<guid isPermaLink="false">https://beuchelt.com/?p=718</guid>

					<description><![CDATA[Introduction This article describes the high-level layout of my computing infrastructure at home, facetiously called my “home cloud”. I have been operating some compute resources beyond a desktops for a long time (covering Windows Servers, SunRay setups, fiber-channel arrays, etc.),&#8230;]]></description>
		
					<wfw:commentRss>https://beuchelt.com/blog/2017/01/08/home-cloud/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CI and CND &#8211; Revisited</title>
		<link>https://beuchelt.com/blog/2015/03/23/ci-and-cnd-revisited/</link>
					<comments>https://beuchelt.com/blog/2015/03/23/ci-and-cnd-revisited/#respond</comments>
		
		<dc:creator><![CDATA[Gerald Beuchelt]]></dc:creator>
		<pubDate>Tue, 24 Mar 2015 00:54:18 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://beuchelt.com/?p=701</guid>

					<description><![CDATA[About this time last year I discussed my thoughts on Counterintelligence (CI) and Computer Network Defense (CND). My basic proposition then was that CND is materially identical (or &#8211; more precisely &#8211; a monomorphism) to a restriction of CI to&#8230;]]></description>
		
					<wfw:commentRss>https://beuchelt.com/blog/2015/03/23/ci-and-cnd-revisited/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Review of this Week: OMG and WIS3</title>
		<link>https://beuchelt.com/blog/2014/03/29/review-of-this-week-omg-and-wis3/</link>
					<comments>https://beuchelt.com/blog/2014/03/29/review-of-this-week-omg-and-wis3/#respond</comments>
		
		<dc:creator><![CDATA[Gerald Beuchelt]]></dc:creator>
		<pubDate>Sat, 29 Mar 2014 15:27:20 +0000</pubDate>
				<category><![CDATA[Interoperability]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[interoperability]]></category>
		<category><![CDATA[standards]]></category>
		<category><![CDATA[threat modeling]]></category>
		<guid isPermaLink="false">https://beuchelt.com/?p=676</guid>

					<description><![CDATA[This week, we made some pretty good progress toward formalizing the conceptual threat modeling work at OMG: OMG SysA Meeting On Wednesday the team presented the result of the last 3 months of work on the conceptual threat model (please&#8230;]]></description>
		
					<wfw:commentRss>https://beuchelt.com/blog/2014/03/29/review-of-this-week-omg-and-wis3/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CND → CICyber</title>
		<link>https://beuchelt.com/blog/2014/03/20/cnd-%e2%86%92-ci%ef%a3%a6cyber/</link>
					<comments>https://beuchelt.com/blog/2014/03/20/cnd-%e2%86%92-ci%ef%a3%a6cyber/#respond</comments>
		
		<dc:creator><![CDATA[Gerald Beuchelt]]></dc:creator>
		<pubDate>Thu, 20 Mar 2014 23:00:42 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[threat modeling]]></category>
		<guid isPermaLink="false">https://beuchelt.com/?p=662</guid>

					<description><![CDATA[There are a lot of organizational Tactics, Techniques, and Procedures (TTPs) in Counterintelligence (CI) that can inform more efficient Defensive Cyber Operations (DCO) or more generally Computer Network Defense (CND) 1 processes and strategies. While the mapping is not perfect,&#8230;]]></description>
		
					<wfw:commentRss>https://beuchelt.com/blog/2014/03/20/cnd-%e2%86%92-ci%ef%a3%a6cyber/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Refining Use Cases for Threat Modeling and Next Steps</title>
		<link>https://beuchelt.com/blog/2014/02/04/refining-use-cases-for-threat-modeling-and-next-steps/</link>
					<comments>https://beuchelt.com/blog/2014/02/04/refining-use-cases-for-threat-modeling-and-next-steps/#respond</comments>
		
		<dc:creator><![CDATA[Gerald Beuchelt]]></dc:creator>
		<pubDate>Tue, 04 Feb 2014 14:41:17 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[standards]]></category>
		<category><![CDATA[threat modeling]]></category>
		<guid isPermaLink="false">https://beuchelt.com/?p=657</guid>

					<description><![CDATA[Here is some progress we made recently as part of the OMG threat modeling working group: in order to guide the development of the threat meta mode, we have agreed to scope the work by looking into defining specific use&#8230;]]></description>
		
					<wfw:commentRss>https://beuchelt.com/blog/2014/02/04/refining-use-cases-for-threat-modeling-and-next-steps/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Quick Update on Threat Modeling</title>
		<link>https://beuchelt.com/blog/2014/01/09/quick-update-on-threat-modeling/</link>
					<comments>https://beuchelt.com/blog/2014/01/09/quick-update-on-threat-modeling/#respond</comments>
		
		<dc:creator><![CDATA[Gerald Beuchelt]]></dc:creator>
		<pubDate>Fri, 10 Jan 2014 02:36:02 +0000</pubDate>
				<category><![CDATA[Interoperability]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[standards]]></category>
		<category><![CDATA[threat modeling]]></category>
		<guid isPermaLink="false">https://beuchelt.com/?p=653</guid>

					<description><![CDATA[We had a number of successful meetings after the OMG Technical Meeting in December, culminating in a Kick-Off Meeting on Jan 6, 2014. At that meeting, we reviewed the current status of the project, and received great guidance and support&#8230;]]></description>
		
					<wfw:commentRss>https://beuchelt.com/blog/2014/01/09/quick-update-on-threat-modeling/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Threat Modeling Project</title>
		<link>https://beuchelt.com/blog/2013/12/11/threat-modeling-project/</link>
					<comments>https://beuchelt.com/blog/2013/12/11/threat-modeling-project/#respond</comments>
		
		<dc:creator><![CDATA[Gerald Beuchelt]]></dc:creator>
		<pubDate>Thu, 12 Dec 2013 04:31:38 +0000</pubDate>
				<category><![CDATA[Interoperability]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[architecture]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[interoperability]]></category>
		<category><![CDATA[standards]]></category>
		<category><![CDATA[threat modeling]]></category>
		<guid isPermaLink="false">https://beuchelt.com/?p=637</guid>

					<description><![CDATA[At the OMG Technical Meeting in Santa Clara, CA today I presented some thoughts on creating a comprehensive model for describing information security threats. My session was hosted by the System Assurance Task Force as part of their charter to&#8230;]]></description>
		
					<wfw:commentRss>https://beuchelt.com/blog/2013/12/11/threat-modeling-project/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Email &#8211; Identity Management Gone Awry</title>
		<link>https://beuchelt.com/blog/2013/07/20/email-identity-management-gone-awry/</link>
					<comments>https://beuchelt.com/blog/2013/07/20/email-identity-management-gone-awry/#respond</comments>
		
		<dc:creator><![CDATA[Gerald Beuchelt]]></dc:creator>
		<pubDate>Sat, 20 Jul 2013 15:14:53 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Identity]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[identity and access control management]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[social media]]></category>
		<guid isPermaLink="false">https://beuchelt.com/?p=611</guid>

					<description><![CDATA[Yahoo has started a program where users may request to have existing account and email names transferred to them. If a requested account has not been in use for an extended period of time, Yahoo will transfer this account to&#8230;]]></description>
		
					<wfw:commentRss>https://beuchelt.com/blog/2013/07/20/email-identity-management-gone-awry/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Multi Factor for Personal Use</title>
		<link>https://beuchelt.com/blog/2013/02/23/multi-factor-for-private-use/</link>
					<comments>https://beuchelt.com/blog/2013/02/23/multi-factor-for-private-use/#respond</comments>
		
		<dc:creator><![CDATA[Gerald Beuchelt]]></dc:creator>
		<pubDate>Sat, 23 Feb 2013 16:51:04 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Tips and Tricks]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[IT systems]]></category>
		<guid isPermaLink="false">https://beuchelt.com/?p=591</guid>

					<description><![CDATA[Right now, I am looking into alternative multi-factor authentication solutions. There are the obvious contenders such as SecureID or smartcards, but they tend to be on the pricy side, especially if want to use them for your blog, your home&#8230;]]></description>
		
					<wfw:commentRss>https://beuchelt.com/blog/2013/02/23/multi-factor-for-private-use/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Some Changes</title>
		<link>https://beuchelt.com/blog/2013/01/05/some-changes/</link>
					<comments>https://beuchelt.com/blog/2013/01/05/some-changes/#respond</comments>
		
		<dc:creator><![CDATA[Gerald Beuchelt]]></dc:creator>
		<pubDate>Sat, 05 Jan 2013 16:47:55 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber security]]></category>
		<guid isPermaLink="false">http://beuchelt.com/?p=581</guid>

					<description><![CDATA[Starting with the new year, I am working with Demandware as their new Chief Security Officer. In this role I will be responsible for developing and implementing a comprehensive corporate information security governance and management framework, covering all aspects of security&#8230;]]></description>
		
					<wfw:commentRss>https://beuchelt.com/blog/2013/01/05/some-changes/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
