The Missing Persons asked us in the 1980s, “What are words for when no one listens anymore?”
When it comes to cybersecurity, how do you know who you can trust to tell you what’s really going on? And we don’t mean who is telling you the truth. We mean, who is using the right words to accurately describe the events and circumstances that affect you and your ability to protect your data?
Everywhere Jeff Tang looks, he is besieged with news stories using terms like “weapons-grade exploits” to describe the latest malware outbreak. He believes wholeheartedly that the narrative constructed that results from the use of this colorful language is in fact detrimental to the progress of securing our computer networks. So often, news stories and associated reports seek to categorically apply the metaphor of military conflict to cybersecurity – and not every incident in cyber conflict qualifies as a military-style “attack.”
In today’s episode of InSecurity, Matt Stephenson chats with Cylance’s Executive Mischief Consultant Jeff Tang about the value of words in cybersecurity. Jeff explains why it is wrong to compare the inconvenience of not being able to access your social media account to a real-world kinetic cyber-attack that may cause mass human causalities.
Join us and understand that, while computers work in a world of binaries, that doesn’t mean our thinking about them has to be binary as well. It’s time we transition away from using these military terms when discussing cybersecurity – or face the real-world consequences.
About Jeff Tang
Jeff Tang (@mrjefftang) is a Senior Security Researcher at Cylance focused on operating systems and vulnerability research. He started his career as a Global Network Exploitation and Vulnerability Analyst at the National Security Agency, where he conducted computer network exploitation operations in (Read more...)
*** This is a Security Bloggers Network syndicated blog from Cylance Blog authored by Cylance Podcasts. Read the original post at: https://threatvector.cylance.com/en_us/home/insecurity-podcast-jeff-tang-stop-trying-to-make-weaponized-cyber-happen.html