What Do I Mean by Cyber?I have worked for five decades since study with C. A. Doxiadis on the notion of post-automobile society. I later absorbed much of Alexander’s Pattern Language, Integrating this with the inspiration of B. Fuller, I see the cyber age as the one we are living in. I see post-automobile…
Cyberspace! I would go further and say it doesn’t exist! It’s a construct used to describe some of the new avenues of human expression made possible by technology. As a separate space it doesn’t exist and it’s counter-productive to refer to it as that.
The Adventures of Floating Clausewitz Head: The OODA Loop and the Journey into the Chinese Room: Part IIContinued from Part I:Suddenly, the ground shook as bombs started to fall everywhere. The Navy and Air Force were using…
An Awesome Cyber Intelligence ToolI recently came across Stucco, an intelligence aggregation and query tool from Oak Ridge National Laboratory. I have found it to be an excellent resource for scratching my personal hacker itches as well as research for my full-time job.
User rights in CybersecurityIn our field, users are often rightless — they have many personal duties (do not use torrents, do not bring personal music to corporate PCs, do not share a password), but very a few personal rights.
Back-up positions for cybersecurity specialistsGlobal economy and markets made it clear that surprises can be very unpleasant. And if information security will suffer\transform into something not very clear to most specialists, we need to have escape routes, i.e. understand what related professional areas exist, how are…
5 Discredited Terms in CybersecurityFor a long time, the information security has been a closed issue of military officers and scientists, and for ordinary person the situation has not changed. Vendors cultivate their “selectness”, intimidate non-specialists of growing non-countering threats. But even in such “muddled…