CyberSecPolitics
Friday, August 26, 2016
The Unintended Consequences of Software Liabilities
›
" Pacemakers ". People love the idea of holding software company's feet to the fire when it comes to security. You hear a...
Monday, August 22, 2016
Data is not Analysis in Vulnerability Equities
›
If you haven't read Matt Tait's and my piece on why we think the VEP has severe problems, please do so! We love heckling. :) That s...
Tuesday, August 16, 2016
Why EQGRP Leak is Russia
›
"Cyber Stalingrad Statue has opinions!" First off, it's not a "hack" of a command and control box that resulted...
1 comment:
Monday, July 18, 2016
A review of Bellovin/Landau/Lin's paper on Cyber Weapons
›
http://papers.ssrn.com/sol3/ papers.cfm?abstract_id=2809463 Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and ...
Tuesday, July 12, 2016
When is a Cyber Attack an Act of War?
›
Politics aside, one lesson we can draw from the ongoing debate over Hillary Clinton’s private email server is this - in the years ahead, qu...
2 comments:
Friday, June 24, 2016
Can Google do Cyber Deterrence?
›
http://smallwarsjournal.com/jrnl/art/law-of-armed-conflict-attribution-and-the-challenges-of-deterring-cyber-attacks I want to post a few ...
2 comments:
Vulnerabilities Resist Catagorization
›
Policy is a lot about categories of things. Recently I was reading a paper which categorized exploits in a way that rang weirdly to me, sinc...
‹
›
Home
View web version