Cyberspace! I would go further and say it doesn’t exist! It’s a construct used to describe some of the new avenues of human expression made possible by technology. As a separate space it doesn’t exist and it’s counter-productive to refer to it as that.
The Adventures of Floating Clausewitz Head: The OODA Loop and the Journey into the Chinese Room: Part IIContinued from Part I:Suddenly, the ground shook as bombs started to fall everywhere. The Navy and Air Force were using…
An Awesome Cyber Intelligence ToolI recently came across Stucco, an intelligence aggregation and query tool from Oak Ridge National Laboratory. I have found it to be an excellent resource for scratching my personal hacker itches as well as research for my full-time job.
User rights in CybersecurityIn our field, users are often rightless — they have many personal duties (do not use torrents, do not bring personal music to corporate PCs, do not share a password), but very a few personal rights.
Back-up positions for cybersecurity specialistsGlobal economy and markets made it clear that surprises can be very unpleasant. And if information security will suffer\transform into something not very clear to most specialists, we need to have escape routes, i.e. understand what related professional areas exist, how are…
5 Discredited Terms in CybersecurityFor a long time, the information security has been a closed issue of military officers and scientists, and for ordinary person the situation has not changed. Vendors cultivate their “selectness”, intimidate non-specialists of growing non-countering threats. But even in such “muddled…
Trane thermostat is a hot spot for viruses on home networks:Back in April 2014, the Cisco Talos security team alerted Trane that its Wi-Fi-connected ComfortLink II thermostat had some serious security flaws. The most egregious was the hardcoding of SSH passwords in the device.The SSH service is…