CyberSecPolitics
Tuesday, February 11, 2020
The Transmission Curve
›
Imagine everything your company does, but in terms of a RAR file. Every document, and email, and VOIP-call, and Teams message, every passwor...
1 comment:
Thursday, January 23, 2020
AI Cyber Controls and Bezos and MBS
›
I wanted to link to this post on CFR where I wrote about the right way to look at creating new export controls in a complex technical space...
Wednesday, January 15, 2020
Local PrivEscs that are Remote Code Execution
›
One thing you will notice if you read the NSA advisory yesterday and the Microsoft advisory is that the NSA advisory had MORE information in...
Thursday, December 19, 2019
DHS's cyber policy is a straight up casualty of the partisan wars
›
A great Politico article came out this week on DHS and its rocky history when it comes to executing on its cyber mission. Every aspect of i...
Monday, December 16, 2019
Are End Use Controls Fit For Use?
›
https://twitter.com/Aristot73/status/1203250494745010177?s=20 (You can see here a classic case of End Use Controls) You would not...
Wednesday, December 11, 2019
Crypto Prima Nocta
›
Yesterday there was a big Senate hearing on Encryption and the witnesses were Matt Tait (hacker), Cyrus Vance (DA NY), Erik Neuenschwander ...
Sunday, December 8, 2019
"Stability"
›
If you read Richard Haass's book ( https://www.cfr.org/book/world-disarray ) or listen to the GCSC or Joe Nye you will hear a lot about ...
‹
›
Home
View web version