CyberSecPolitics
Wednesday, December 9, 2015
The Force Awakens: Dec 8 Wassenaar Meeting Notes
›
I spent my day here so you didn't have to! So one thing you might know about spooks is that they can "Talk Around" almost...
2 comments:
Thursday, December 3, 2015
NTIA Vulnerability Disclosure Loya Jirga Part Deux
›
Here we are, gathered in a circle to talk about vulnerability. So the NTIA meeting was livestreamed yesterday (and livetweeted ) and ...
Thursday, October 29, 2015
Wassenaar Meeting with Department of Commerce on 10/28
›
So I went to the Department of Commerce to speak at one of their export control working group meetings. It was fascinating. Not my talk, whi...
Thursday, December 11, 2014
Our Ironic Pearl Harbor
›
" And with each passing year it is going to seem more quaint, the little tin airplanes bombing the sleepy iron giants " -J. MacDo...
Tuesday, January 8, 2013
The new team on a new field
›
We are now starting to see what the team is going to look like in the Federal sector of cyber security at the very top: Brennan (DCIA), Hag...
Wednesday, October 17, 2012
Tools of Oppression
›
" In reality, cyber tools of oppression are most often in the form of databases." http://infosecisland.com/blogview/22587-The-...
Monday, October 15, 2012
Being "held accountable" is the new black.
›
There's a general proscription in the IC about talking in any way about offensive things - for good reason. For for that reason, I recom...
1 comment:
‹
›
Home
View web version