Focusing on the intelligence and analysis, Chapter 10 again stresses proper use of knowledge as the crucial attribute of a commander.
In Chapter 8, Sunzi finally shifts the focus from “doing” to “knowing,” and begins to reveal the deep connections between CTI and InfoSec.
“Do not depend on the enemy not coming; depend rather on being ready for him. Do not depend on the enemy not attacking; depend rather on having a position that cannot be attacked.”
Sun Tzu advises that we should first make ourselves invincible, and then await enemy vulnerability. Does this idea work in the realm of Cyber Security?