A History of Philosophy | 14 Aristotle's Ethics

What I Would Do with a Billion Attacks a Day

|
Statistics report that some organizations get more than a million attack attempts a day and some ISPs claim to see more than a billion. I started thinking that instead of fighting all these attacks, we should use them. I say we take those attacks and find something productive and even ... Read More

Why Don’t We Just Eliminate All the Hackers?

|
One thing most cybersecurity experts agree on is that attribution online is hard. Really, really hard. Which means something, because those people don’t agree on a whole lot. In this blog, Pete Herzog provides answers to some of the most commonly asked questions about hackers ... Read More

The Wonderful Strategy of Threat Tolerance

|
Has anyone else noticed that the new cybersecurity slogan seems to have become “it’s better to be lucky than secure?” This phenomenon is known as Threat Tolerance, and it’s one that’s been sweeping the globe in recent years ... Read More

The Pop Music that is Modern Cybersecurity

|
Cybersecurity has a lot in common with modern pop stars: the constant demand, the sleepless nights, and way too much responsibility over things that have nothing to do with your actual job ... Read More

Privacy: The Killer App

|
The problem with privacy is that the masses don’t understand what the word actually means. Once you have an idea of what privacy truly is, as a thing you can use to protect yourself, you realize that it’s just not something anyone can give you ... Read More

What Kind of Cybersecurity Professional Are You?

|
So, you want a cybersecurity job. But where do you fit in? What role in cybersecurity is right for you? Well, you’re in luck! Use this simple test to find out ... Read More

The Trouble with Smart City Security Assessments

|
Because technology has grown so diversely, cybersecurity has become an industry of specialists. In a corporate assessment, you may assemble a team that has two or three specialists depending on the industry. In a Smart City security assessment, you may need to assemble them all ... Read More

Cybersecurity and the Ungrateful Masses

|
Cybersecurity often feels like a thankless job. If I track a criminal through the forest by looking at shoe impressions and broken twigs, I’m amazing. But if I track a criminal across the globe through code variations and connection timings in a variety of logs, at best I’d get an ... Read More

A White Paper About Security White Papers That Looks Like a Security Article

|
Let me tell you what I want to learn from a white paper, especially a cybersecurity product white paper: I want to find out whether or not a product or service is right for me. Your white paper can be pleasing to the eye and give the illusion of authority ... Read More

How to Make Employees Happy

|
The relation between trust and security is well founded and well researched. Which is why fundamental changes to improve how people trust will inherently improve security. And these methods all come from making happier employees. In this article, I’ll explain why ... Read More