Chapter 13 is the concluding chapter of the Sunzi. While he has continuously stressed the critical importance of intelligence and…
The focus of Chapter 12, Incendiary attacks, may seem irrelevant in InfoSec, until we consider the role of the Podesta email and the DNC hacks.
In Chapter 8, Sunzi finally shifts the focus from “doing” to “knowing,” and begins to reveal the deep connections between CTI and InfoSec.
“Do not depend on the enemy not coming; depend rather on being ready for him. Do not depend on the enemy not attacking; depend rather on having a position that cannot be attacked.”
Chapter 7 – Armed Contest – is something of a psychological take on engaging in battle, and as such its…