Cybersecurity
This is not a CrowdStrike Post
A more secure cyberspace will only come about if technologists impact the tech, business, and policy stacks.
Cybersecurity
A more secure cyberspace will only come about if technologists impact the tech, business, and policy stacks.
Cybersecurity
Let’s get something straight right from the get-go: from the perspective of the manufacturer there is no incentive to build secure things.
Cybersecurity
But we have norms or we don’t. They’re only norms if they apply to everyone, equally, all the time.
Cybersecurity
An imagined future... I am a Cybersecurity Capabilities Manager. What’s that? Well, the “cybersecurity” part should be self-evident. “Capabilities” is code for the AI that does all the actual work. “Manager” is code for “guy who creates prompts, tunes bots, and talks to customers if they ask to talk
Cybersecurity
The problem with trying to make someone a scapegoat is that they can very easily become a ram if you’re not careful.
Cybersecurity
Daisy, daisy, give me your answer do...
Cybersecurity
If the necessary institutions, relationships, and capabilities are not in place, and follow-on work does not clearly define success in quantifiable terms, this has been another exercise in “doing what we know how to do” versus something that might make a difference.
Cybersecurity
Another year, another set of folks who think they’ve cracked the nut on how to address the government’s cybersecurity staffing woes. It’s not that leveraging the whole of society to address these issues isn’t a good idea, but the road to hell is paved with realities
Cybersecurity
News about ransomware gang takedowns and ransom recoveries make for great headlines, and the way some people talk you’d think we had this ransomware thing licked. But while these are certainly “wins,” they’re not really having a noticeable impact, and if we keep going at these issues in
Cybersecurity
They’re not cybersecurity experts, but they did stay at a Holiday Inn Express last night.
Cybersecurity
It was revealed this week that Google had detected an online counterterrorism operation being carried out by a U.S.-allied government, and made the unilateral decision to shut it down. This is certainly not the first time Google, AWS, or another platform has detected such activity, but it is
Cybersecurity
If everyone agrees on what we should do, why do we seem incapable of doing it?