Part 5 of Rethinking CTI
Building off of the Classical Chinese Context, this section introduces 5 classical terms and connects them to actionable CS and CTI ideas.
Part 4 of Rethinking CTI
As a worldview radically different from the West, Chinese thought must be approached carefully – or we run the risk of improperly understanding and applying its ideas. We begin with core language ideas, on which all later concepts will build.
Part 3 of Rethinking CTI
Where the traditional warfare model ended in a failed analogy, the classical Chinese model offers a lot of potential value. Examination of five key points suggests that developing this model may prove very useful.
Part 2 of Rethinking CTI
Cyber-warfare and CTI are to traditional warfare what chess is to snakes and ladders: both play out on a grid, but that’s where the similarities end. By understanding the underlying problems behind the failed analogy, the requirements for the new system emerge.
Part 1 of Rethinking CTI
The traditional military warfare model is a common analogy to cyber-warfare and CTI. However, the analogy suffers from four fatal flaws, and is entirely incoherent.
Presenting Information Security as a product feeds into a dangerously false narrative., which undermines the future of security. Changing perspectives helps to correct some misconceptions, and also improves the functionality of security.
Popular misconceptions about what cyber security is and what it does, have established a dangerously false narrative for the future of cyber security, and created several critical problems