A blog dedicated to information warfare, cyber security, information security, or whatever you choose to call it. Ethical hacking, vulnerability assessments, penetration testing, web application testing, and social engineering techniques may also be discussed.
IT Security Spending
I recently asked Richard Bejtlich why people with money haven't grasped the "Information Warrior" mentality. Much to my surprise he replied on his blog. Thanks Richard!