CyberSecPolitics

Friday, June 24, 2016

Can Google do Cyber Deterrence?

›
http://smallwarsjournal.com/jrnl/art/law-of-armed-conflict-attribution-and-the-challenges-of-deterring-cyber-attacks I want to post a few ...
2 comments:

Vulnerabilities Resist Catagorization

›
Policy is a lot about categories of things. Recently I was reading a paper which categorized exploits in a way that rang weirdly to me, sinc...
Wednesday, June 22, 2016

Useful Fundamental Metrics for Cyber Power

›
https://www.lawfareblog.com/what-are-important-cyber-conflict-questions-and-answers   Paul Rosenzweig Quoting from his article: How...
Tuesday, June 21, 2016

The Vulnerabilities Equities Process is not a Panacea

›
http://belfercenter.ksg.harvard.edu/files/vulnerability-disclosure-web-final3.pdf I wanted to post this paper and discuss a few things...
Friday, June 17, 2016

A way forward for Microsoft and Friends

›
You can watch Jan Neutze from Microsoft talk to NATO at CyCon 2016 and see him repeat the talking points we have heard over and over from...
Monday, June 13, 2016

What Playpen Hath Wrought

›
Before looking at the Playpen miasma that resulted from the FBI’s use of a “NIT” (aka, Remote Access Trojan) to unmask users of a website w...
1 comment:
Tuesday, May 10, 2016

The common thread: Fuzzing, Bug Triage, and Attacker Automation

›
INFILTRATE People think of conferences as singular events, but INFILTRATE , which is Immunity's open access offensive information sec...
1 comment:
‹
›
Home
View web version

Contributors

  • Chris Rohlf
  • Cyber Lunarium Commission
  • Dave Aitel
Powered by Blogger.