CyberSecPolitics

Friday, January 25, 2019

There is no Escalatory Ladder in the Matrix

›
I'm still reading Bytes, Bombs and Spies , specifically the chapter where they define "OCO" to mean "Offensive Cyber ...
2 comments:
Wednesday, January 23, 2019

Bytes Bombs and Spies

›
A shibboleth for whether you should be doing cyber policy work. :) ISR has to be anticipatory, comprehensive, and real time. And because...
Friday, January 4, 2019

VEP: Centralized Control is Centralized Risk

›
When we talk about the strategic risks of a Vulnerability Equities Process people get absorbed in the information security risks. But t...
Thursday, December 20, 2018

VEP: Handling This Patch's Meta Changes

›
We may be about to enter the Healer meta in Cyber War for Season 3, what does that mean for you? The Meta Change Google caught an 0da...
Wednesday, December 19, 2018

The Brussels Winter VEP Conference

›
So recently I went to a  conference on vulnerability equities  which was under  Chatham House Rule , which means I can't say WHO SAI...
Thursday, November 29, 2018

The false path of ReIntermediation

›
Salsa Shark. . .  I sent a recent paper on information operations over Twitter to some people for feedback and one of the comments was...
Tuesday, November 20, 2018

A Question of Trust

›
For those of you who have not read Eugene Kasperky's latest piece, it is here: https://www.forbes.com/sites/eugenekaspersky/2018/11/19/...
‹
›
Home
View web version

Contributors

  • Chris Rohlf
  • Cyber Lunarium Commission
  • Dave Aitel
Powered by Blogger.