CyberSecPolitics
Monday, July 18, 2016
A review of Bellovin/Landau/Lin's paper on Cyber Weapons
›
http://papers.ssrn.com/sol3/ papers.cfm?abstract_id=2809463 Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and ...
Tuesday, July 12, 2016
When is a Cyber Attack an Act of War?
›
Politics aside, one lesson we can draw from the ongoing debate over Hillary Clinton’s private email server is this - in the years ahead, qu...
2 comments:
Friday, June 24, 2016
Can Google do Cyber Deterrence?
›
http://smallwarsjournal.com/jrnl/art/law-of-armed-conflict-attribution-and-the-challenges-of-deterring-cyber-attacks I want to post a few ...
2 comments:
Vulnerabilities Resist Catagorization
›
Policy is a lot about categories of things. Recently I was reading a paper which categorized exploits in a way that rang weirdly to me, sinc...
Wednesday, June 22, 2016
Useful Fundamental Metrics for Cyber Power
›
https://www.lawfareblog.com/what-are-important-cyber-conflict-questions-and-answers Paul Rosenzweig Quoting from his article: How...
Tuesday, June 21, 2016
The Vulnerabilities Equities Process is not a Panacea
›
http://belfercenter.ksg.harvard.edu/files/vulnerability-disclosure-web-final3.pdf I wanted to post this paper and discuss a few things...
Friday, June 17, 2016
A way forward for Microsoft and Friends
›
You can watch Jan Neutze from Microsoft talk to NATO at CyCon 2016 and see him repeat the talking points we have heard over and over from...
‹
›
Home
View web version