Category: Technology

Threat actor zero (TA0)

When Mandiant came out with the APT1 report the world was shattered into two camps. In the first camp was a group of people who were happy to have more information on the bad guys entering their networks and doing…

Strategic information security

It’s not only a good idea it is one that most people will never understand making it absolutely the next buzzword at security conventions. Strategy is often misunderstood. It simply isn’t an easy term for most people to get there…

3 forms of cyber attribution

There are three forms of attribution: 1) Political attribution based on the actors motives and goals. 2) Technical attribution based on tactics, techniques and means of an entity. 3) Forensic attribution based on the evidence of behaviors and facts.  

If the job sucks be awesome

I see a lot of discussion at hacker cons or security cons depending on your predilection that says something to the effect “I’m burned out and drink to much.” The information security community has a hidden underbelly that hangs over…

Strat pack fall down go boom

I’ve been watching the response to Adam Elkus recitation of issues of blogging on grand strategy. I have been following the writing of Adam since he was at Occidental College. I have been following many writers as they start out…