If we should face a Dead-End AI future, the cybersecurity industry will continue to rely heavily on traditional approaches, especially human-driven ones. It won’t...
Hi, what are you looking for?
If we should face a Dead-End AI future, the cybersecurity industry will continue to rely heavily on traditional approaches, especially human-driven ones. It won’t...
How will Artificial Intelligence develop in the near term, and how will this impact us as security planners and practitioners?
We Can’t Rely on Our Own Governments to Practice Responsible Full Disclosure. Full Disclosure is Compromised.
Cryptocurrency was envisioned as a revolution in how money is created, used and controlled.
Cybersecurity has gone through many changes over the past decade. From being a niche sector, rarely taken seriously or understood, to underpinning national security,...
Organizations That Do Not Invest Even in Baseline Security Are Realistically Uncompetitive
There are two possible outcomes: if the result confirms the hypothesis, then you've made a measurement. If the result is contrary to the hypothesis,...
Machine Learning, or Artificial Intelligence as it is sadly erroneously being marketed as, is all the rage right now. We are being promised a...
We Can Automate the Action, Without Automating the Decision...
What is Essentially Needed is a NATO or Similar Structure Organization for Cyberwarfare
Einstein is often quoted as having said that insanity is doing the same thing again and again and expecting a different result. When it...
The A-Z of professional Vulnerability Management: A – is for Authenticated Scanning Choices, choices…
As the “Snowden leaks” continue in their revelations and unraveling of the twisted web of government surveillance, it is becoming clear that the foundation...
The Spiegel reports that the cyber-attack against the half-state owned telecommunications provider Belgacom was an operation executed by the UK’s GCHQ, based on documents...
For many victims of an information security breach, prioritization of vulnerabilities becomes an act forced upon them a priori. “Ooops, that one was serious,...
In the weeks since the Mandiant APT1 Report was released, the conclusions presented by Mandiant have been extensively repeated and commented on by pretty...
European Aeronautic Defence and Space Company and ThyssenKrupp Breached, Germany Calls for Mandatory Breach Disclosure
The first two months of 2013 witnessed a level of escalation in cyber espionage and cyber exploitation incidents that few would have predicted or...
What would happen if Chinese or Russian agents were to conduct a covert operation, sabotaging America’s electricity grid using targeted bombs, leading to widespread...
Let He Who is Free of Vulnerabilities Cast the First Exploit.