The focus of Chapter 12, Incendiary attacks, may seem irrelevant in InfoSec, until we consider the role of the Podesta email and the DNC hacks.
Chapter 6 – Weak Points and Strong Points – focuses on the methodological approach to war. The key takeaway is…
Part 5 of Rethinking CTI
Building off of the Classical Chinese Context, this section introduces 5 classical terms and connects them to actionable CS and CTI ideas.
Part 3 of Rethinking CTI
Where the traditional warfare model ended in a failed analogy, the classical Chinese model offers a lot of potential value. Examination of five key points suggests that developing this model may prove very useful.
Presenting Information Security as a product feeds into a dangerously false narrative., which undermines the future of security. Changing perspectives helps to correct some misconceptions, and also improves the functionality of security.
Popular misconceptions about what cyber security is and what it does, have established a dangerously false narrative for the future of cyber security, and created several critical problems