Sun Tzu advises that we should first make ourselves invincible, and then await enemy vulnerability. Does this idea work in the realm of Cyber Security?
In the first half of Chapter 3, Sunzi focused on the elements of engagement in, and waging of,war. This information…
Chapter 3 of the Sunzi is divided into two sections. The first section focuses on the core strategies of thinking about military engagement – i.e. crucial guidelines in how to approach the threat of, and engagement in. war. This chapter provides some of the most quotable lines of the Art of War, though they’re seldom fully understood.
Chapter 2 of the Art of War
In the chapter “On Waging Battle,” Sunzi offers his famous prescription for a swift victory, and outlines key components that make a quick victory possible.
Chapter 1 of the Art of War – Part 2
Sunzi’s basic military assessment sets the scene for our CS/CTI development, and establishes the foundations to be built up throughout the book
Chapter 1 of the Art of War – Part 1
Sunzi’s basic military assessment sets the scene for our InfoSec/CTI development, and establishes the foundations to be built up throughout the book
Exemplifying problems of security products and outsourcing security through the latest OneLogin hack.
A critical overview of the layout and relations of Sun Tzu’s The Art of War, including the relation between cyber-security as a whole and cyber-threat intelligence (CTI) in particular.
Part 7 of Rethinking CTI
Focused on creating a stable and sustainable state, all classical Chinese thinkers considered the question of security as a key component, and came to a similar conclusion: security requires a pursuit of self-perfection on the individual, as well as an organizational, level.
Part 6 of Rethinking CTI
Having established a core foundation for classical Chinese ideas, this article introduces the three military terms that encompass CTI, CS, and their ideal use.