James Harris is a former FBI agent who spent 8 years working to combat child sexual exploitation. He is also a computer guy, he codes, knows his tech, and isn’t ignorant on encryption. Jim wrote an excellent Twitter thread about the “backdoor the encryption, because children” argument. Rather than engage it head on, he contextualises […]
The term “phishing” constraints thinking
The human factor is a major component of every security environment. It is important to understand and reason about how humans can be subverted into acting as malicious agents against themselves. The term “phishing” carries too much baggage, “email” “getting login credentials”. I think to have a broader understanding for reasoning about the human factor, […]
Moore’s Law goes to War
Technological superiority encourages tactical innovation, finding the best way to deploy superior systems to dominate. When there is parity, dominance has to be achieved elsewhere, eg strategic. Technological superiority doesn’t last forever.
- « Previous Page
- 1
- …
- 8
- 9
- 10
- 11
- 12
- Next Page »