The decades-long effort to develop solutions to cyber insecurity has been led by the usual suspects drawn from the policy and legal community. That’s not […]
Category: Technology
The Importance of Context
Last night during the Super Bowl, cryptocurrency company Coinbase ran an ad that featured a QR code bouncing around the screen. That’s it. No actors, […]
R.E.S.P.E.C.T.
No regime that works for bugs, gas, or isotopes is going to work for code.
The Wolf Approaches
If cybersecurity had a doomsday clock, it just got closer to midnight. Thankfully, we’ve got a snooze button.
The Global Ungoverned Area
Looking at the Internet through Westphalian-tinted glasses is not going to make us safer or more secure.
C.R.E.A.M. IoT Edition
We can go round and round about what’s going to drive improvements in computer security writ large, but when you boil it down it’s really only about one of and/or two things: money and bodies.
Save Yourself – Delete Your Data
If an era when remedying computer security failures is cheaper than calling in computer security experts is even remotely realistic, we need to collectively get on board with some new ways of doing things.
Intelligence Agencies Are Not Here to Defend Your Enterprise
The way to reduce the chance that someone can crack your computer code is to write better code, and test it faster than the spooks can.
How Do You Get Good at Incident Response?
The true measure of defensive success is the speed at which you detect, eject and mitigate the actions of your attackers.
Being All You Can’t Be
Who builds weapons? Who connects the far-flung military commands? Where does all the nation’s technical expertise reside?