CyberSecPolitics

Tuesday, February 11, 2020

The Transmission Curve

›
Imagine everything your company does, but in terms of a RAR file. Every document, and email, and VOIP-call, and Teams message, every passwor...
1 comment:
Thursday, January 23, 2020

AI Cyber Controls and Bezos and MBS

›
I wanted to link to this post on CFR  where I wrote about the right way to look at creating new export controls in a complex technical space...
Wednesday, January 15, 2020

Local PrivEscs that are Remote Code Execution

›
One thing you will notice if you read the NSA advisory yesterday and the Microsoft advisory is that the NSA advisory had MORE information in...
Thursday, December 19, 2019

DHS's cyber policy is a straight up casualty of the partisan wars

›
A great Politico article came out this week on DHS and its rocky history when it comes to executing on its cyber mission. Every aspect of i...
Monday, December 16, 2019

Are End Use Controls Fit For Use?

›
https://twitter.com/Aristot73/status/1203250494745010177?s=20 (You can see here a classic case of End Use Controls) You would not...
Wednesday, December 11, 2019

Crypto Prima Nocta

›
Yesterday there was a big Senate hearing on Encryption and the witnesses were Matt Tait (hacker), Cyrus Vance (DA NY), Erik Neuenschwander ...
Sunday, December 8, 2019

"Stability"

›
If you read Richard Haass's book ( https://www.cfr.org/book/world-disarray ) or listen to the GCSC or Joe Nye you will hear a lot about ...
‹
›
Home
View web version

Contributors

  • Chris Rohlf
  • Cyber Lunarium Commission
  • Dave Aitel
Powered by Blogger.