Skip to content

Haft of the Spear

Ruminating on issues related to the pointy end

  • About
  • Projects
  • Resources

Category: Computer Security

Cyber Responsibility: The Trickle-Down Effect
Computer Security, Security, Technology

Cyber Responsibility: The Trickle-Down Effect

November 22, 2016 Mike 2 mins read

Regardless of your leadership style remember one thing: people will focus on whatever they are rated on or compensated for.

We Learn From Death
Computer Security, Information Security, Reform

We Learn From Death

October 13, 2016October 13, 2016 Mike 3 mins read

Cybersecurity will get better when people die in sufficiently large numbers.

Computer Security, Information Security, Technology

Better Design, Better Security Participation?

October 13, 2016 Mike 2 mins read

he less users have to think about making sound security decisions, and the easier it is for them to take action, the less likely they are to become victims.

Good Cyber Security is Not Glamorous
Computer Security, Information Security, Reform, Security, Technology

Good Cyber Security is Not Glamorous

September 6, 2016October 13, 2016 Mike 4 mins read

Advancing cyber security starts with promulgating the message that like most things in life: success is about the grind.

Intelligence Agencies Are Not Here to Defend Your Enterprise
Computer Security, Defense, Information Security, Intelligence, National Security, Reform, Security, Technology

Intelligence Agencies Are Not Here to Defend Your Enterprise

August 19, 2016October 13, 2016 Mike 3 mins read

The way to reduce the chance that someone can crack your computer code is to write better code, and test it faster than the spooks can.

The Airborne Shuffle in Cyberspace
Computer Security, Information Operations, Information Security, Intelligence, National Security, Reform, Security, Technology

The Airborne Shuffle in Cyberspace

July 19, 2016October 13, 2016 Mike 4 mins read

We can and should be doing far more than we apparently are, because I guarantee our adversaries are.

How Do You Get Good at Incident Response?
Computer Security, Security, Technology

How Do You Get Good at Incident Response?

May 28, 2016October 13, 2016 Mike 4 mins read

The true measure of defensive success is the speed at which you detect, eject and mitigate the actions of your attackers.

Cyber Security Through the Lens of Theranos
Computer Security, Reform, Security, Technology

Cyber Security Through the Lens of Theranos

May 19, 2016October 13, 2016 Mike 3 mins read

If we’re not checking ourselves we’re setting ourselves up for a situation where checks will be imposed upon us by people who know very nearly nothing of what it takes to succeed, much less advance security.

Computer Security, Defense, Military, National Security, Reform

“Cyber MAD” is a Bad Idea. Really Bad.

June 22, 2015 Mike 4 mins read

If the scenario you need to make your theory work in cyberspace is indistinguishable from a James Bond script, you can’t be taken seriously.

Computer Security, Intelligence, National Security, News, Security, Technology

Malware Analysis: The Danger of Connecting the Dots

March 5, 2015April 23, 2021 Mike 12 mins read

A lot of people fall victim to a number of problems, fallacies and mental traps when they attempt to draw conclusions from data

Posts navigation

1 2 3 4 5
May 2022
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
3031  
« Apr    

Categories

Copyright © 2022 | All Rights Reserved. Mik by Shark Themes