CyberSecPolitics

Wednesday, March 29, 2017

Stewart Baker with Michael Daniel on ze Podcasts

›
I want to put a quick note out about the latest Steptoe Cyber Law podcast, which is usually interesting because Stewart Baker is a much bett...
Wednesday, March 1, 2017

Control of DNS versus the Security of DNS

›
"We're getting beat up by kids, captain!" So instead of futile and counterproductive efforts trying to regulate all vuln...
Tuesday, February 21, 2017

Some hard questions for team Stanford

›
These Stanford panels have gotten worse, is a phrase I never thought I'd say. But the truly painful hour of reality TV above needs ja...
Friday, February 17, 2017

Just cause deterrence is different in cyber doesn't mean it doesn't exist

›
Are there Jedi out there the Empire cannot defeat? That's a long title for a blog post. But ask yourself, as I had to ask Mara Tam ...
Thursday, February 16, 2017

DETERRENCE: Drop other people's warez

›
I'll take: Famous old defacements for $100, Alex I had this whole blogpost written - it had Apache-Scalp in it, and some comments...
Tuesday, February 14, 2017

Cover Visas

›
There is absolutely no steganography in this picture of a fire! So the problem with making it so the only way to get from Iraq to the U...
Saturday, February 11, 2017

The TAO Strategy's Weakness: Hal Fucking Martin the Third

›
I want everyone to watch the video above, but think of it in terms of how to build a cyber war grand strategy. 21-year-old aggressive-as...
‹
›
Home
View web version

Contributors

  • Chris Rohlf
  • Cyber Lunarium Commission
  • Dave Aitel
Powered by Blogger.