The focus of Chapter 12, Incendiary attacks, may seem irrelevant in CS, until we consider the role of the Podesta email and the DNC hacks.
In Chapter 8, Sunzi finally shifts the focus from “doing” to “knowing,” and begins to reveal the deep connections between CTI and CS.
“Do not depend on the enemy not coming; depend rather on being ready for him. Do not depend on the enemy not attacking; depend rather on having a position that cannot be attacked.”
Chapter 1 of the Art of War – Part 1
Sunzi’s basic military assessment sets the scene for our CS/CTI development, and establishes the foundations to be built up throughout the book
Exemplifying problems of security products and outsourcing security through the latest OneLogin hack.