How would Sun Tzu defend computer systems? Poorly. A new era needs new thinking.

Summary:  The theft of the Federal government's personnel data has brought information security back to the front pages. Along with the usual cries of "off with their heads" for the guilty and promises of Total Information Security in the future, as the signal to noise ratio in the media drops towards zero. To help restore … Continue reading How would Sun Tzu defend computer systems? Poorly. A new era needs new thinking.

About the theft of the Federal government’s personnel records: sorting fact from fiction

Summary: We're into the phase of the OPM records breach scandal where the US public policy crisis process predictably breaks down into finger pointing and aggressive guessing. Here is a brief on what little we know, and pointers on what we certainly don't know.  {2nd of 2 posts today.} Contents How was it done? What … Continue reading About the theft of the Federal government’s personnel records: sorting fact from fiction

Identifying the guilty: tying nation states to cyber espionage

Summary:  It's the cycle of our time. Cyberattack on us. The government points a figure, without evidence and encumbered by their history of lies (and of committing similar deeds).  Today cyber intelligence analyst Emilio Iasiello explains why attribution is so important but difficult to do.  (2nd of 2 posts today.) "Attempt the end and never … Continue reading Identifying the guilty: tying nation states to cyber espionage

The Best Defense Is a Strong Defense. Never Fight a Land War in Cyberspace.

Summary: Why defense experts obsess about the relative advantages of different military hardware (e.g., the A-10 vs the F-35), the US has unleashed the tools of cyberwar on Iran. We can expect more in the future, begun by friends and foes. So let's learn the rules. Today Marcus Ranum explains the nature of attack and … Continue reading The Best Defense Is a Strong Defense. Never Fight a Land War in Cyberspace.

“Countdown To Zero Day” describes the new era of war, preparing you for the next attack.

Summary:  Five years after Stuxnet first appeared we have a detailed analysis of its origin (at least, what's known to the public) in Kim Zetter's Countdown To Zero Day.  Here C. Thomas reviews it, explaining Stuxnet's importance. Stuxnet is another American triumph (with Israel's help). We're now the first to use both of the revolutionary … Continue reading “Countdown To Zero Day” describes the new era of war, preparing you for the next attack.