To Cyber or Not the Cyber, That is the RSAC Talk Analysis

To Cyber or Not the Cyber, That is the RSAC Talk Analysis

/ / history, security
I don’t know where you are, but the data analysis of the RSA Conference by the prestigious Cyentia Institute is amazing. They wrote algorithms to tell us what the “most important” talks are each year from 25 years of security conference data, and illustrate our industry’s trend over time. Who ... Read More
RSA Conference 2018: Fun Telco History in SF

RSA Conference 2018: Fun Telco History in SF

/ / history, security
Welcome to SF everyone! As the RSA Conference week begins, which really is a cluster of hundreds of security conferences running simultaneously for over 40,000 people converging from around the world, I sometimes get asked for local curiosities. As a historian I feel the pull towards the past, and this ... Read More

US discusses authorizing cyber attacks outside “war zone”

/ / history, security
In a nutshell, traditional definitions of war linked to kinetic action and physical space are being framed as overly restrictive given a desire by some to engage in offensive attacks online. The head of NSA is asking whether reducing that link and authorizing cyber attack within a new definition of ... Read More
Dar-win or Lose: the Anthropology of Security Evolution

Holding Facebook Executives Responsible for Crimes

/ / history, Poetry, security
Interesting write-up on Vox about the political science of Facebook, and how it has been designed to avoid governance and accountability: …Zuckerberg claims that precisely because he’s not responsible to shareholders, he is able instead to answer his higher responsibility to “the community.” And he’s very clear, as he says ... Read More

Supply Chain Accountability

/ / history, security
Back in 2015 there was some serious consideration of why Toyota were so often used by terrorist groups the US considered their enemy. Here’s some Japanese rationalization: All of this is to show that any sort of dark alliance between Toyota and the Islamic State is completely specious. The Toyota ... Read More
What do visitors think about Special Forces: In the Shadows?

UK Army Museum Reveals Hidden World of the Special Forces

/ / history, security
The National Army Museum in Chelsea, London has freshly opened a new exhibit for you to see if you can see what you’re not supposed to see: The exhibition looks at the work of [five elite] units as well as the skills and dedication needed to make the cut. From ... Read More

Will Facebook CSO Face Jail Time?

/ / security
Russell Wasendorf allegedly stole over $215 million from his customers and falsified bank statements to cover it up. Bernie Madoff was arrested for losing $50 billion while running ponzi schemes. Jeffrey Skilling was initially sentenced to 24 years in prison and fined $45 million for recording projected future profits as ... Read More

Cyberspace Intervention Law and Evolving Views

/ / security
I’m putting two opinion pieces by the esteemed Michael Adams together and getting an odd result. In reflecting on “detailed analysis that is being conducted at USCYBERCOM, across agencies and at events like the Cyber Command legal conference”, Michael opines that the US has taken no position on whether it ... Read More

Origins of “Information Security”

/ / history, security
I’ve promised for a while, years really, to write-up the etymology of the word “hacker”. This always is a popular topic among the information security crowd. Although I regularly talk about it at conferences and put it in my presentations, the written form has yet to materialize. Suddenly I instead ... Read More

Self-Driving Uber Murders Pedestrian

Although it still is early in the news cycle, so far we know from Tempe police reports that an Uber robot has murdered a women. The Uber vehicle was reportedly headed northbound when a woman walking outside of the crosswalk was struck. The woman was taken to the hospital where ... Read More
Loading...