Chapter 13 is the concluding chapter of the Sunzi. While he has continuously stressed the critical importance of intelligence and…
The focus of Chapter 12, Incendiary attacks, may seem irrelevant in InfoSec, until we consider the role of the Podesta email and the DNC hacks.
Chapter 11 introduces the best attack strategies, which translates into the kinds of things the security apparatus must guard against.
Chapter 9 focuses on the role of skill over brute force, and the way of extracting that skill from one’s subordinates.
In Chapter 8, Sunzi finally shifts the focus from “doing” to “knowing,” and begins to reveal the deep connections between CTI and InfoSec.
“Do not depend on the enemy not coming; depend rather on being ready for him. Do not depend on the enemy not attacking; depend rather on having a position that cannot be attacked.”
Strategic advantage (shih) is the core of chapter 5. It is attained through leveraging information by proper knowledge.
Sun Tzu advises that we should first make ourselves invincible, and then await enemy vulnerability. Does this idea work in the realm of Cyber Security?
In the first half of Chapter 3, Sunzi focused on the elements of engagement in, and waging of,war. This information…
Chapter 3 of the Sunzi is divided into two sections. The first section focuses on the core strategies of thinking about military engagement – i.e. crucial guidelines in how to approach the threat of, and engagement in. war. This chapter provides some of the most quotable lines of the Art of War, though they’re seldom fully understood.
Chapter 2 of the Art of War
In the chapter “On Waging Battle,” Sunzi offers his famous prescription for a swift victory, and outlines key components that make a quick victory possible.