You might like
NATO mulls 'offensive defense' with cyber warfare rules reut.rs/2zRFYT8
#EDA ChiefExec Domecq's key take-aways from #EDAConf2017: 1) #cyber can become a weapon of mass destruction 2) we still see too much fragmentation in the #cyber domain 3) education and training are key.
Worum geht es wirklich beim Thema #Cyber-Krieg? CSS Expertin Myriam Dunn Cavelty schafft Klarheit @CyberMyri srf.ch/news/panorama/…
First U.S.-China Law Enforcement and Cybersecurity Dialogue dhs.gov/news/2017/10/0… [WEB]
dhs.gov
First U.S.-China Law Enforcement and Cybersecurity Dialogue | Homeland Security
On October 4, 2017, Attorney General Jefferson B. Sessions III and Acting Secretary of Homeland Security Elaine Duke, together with Chinese State Councilor and Minister of Public Security Guo...
U.S. Army to Stop Buying Tactical Network Systems, General Says dodbuzz.com/2017/09/28/arm… h/t @BlogsofWar
Online-Paper Cyberwar-methods-and-practice (English Version) by Professor Saalbach dirk-koentopp.com/downloads/saal… [PDF]
The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth by Erik Gartzke muse.jhu.edu/journals/inter… [PDF]
LangSec Workshop at IEEE Security & Privacy, Thursday May 25, 2017 spw17.langsec.org/papers.html [Papers]
"The potential impossibility of attribution in cyberspace causes at least three challenges [...]" study4cyberpeace.com/images/A_Non-A… [PDF]
Why language matters – The inherent insecurity of languages and what we can do against it | sicherheitspolitik-blog.de/2015/05/20/why… #langsec
NATO - SPS Conference "Cyberstrategy for Jordan" | nato.int/cps/en/natohq/… [info] and conference procedure recurity-labs.com/content/pub/NA… [slides]
Interesting course and information collection for educational purpose wiki.ucalgary.ca/page/Courses/C… //cc @mlocasto
And for sure, some people like this ping pong game because they can win fast and earn the low hanging fruits from the ping-pong tree.
Promote smart ideas of people who think out of the box regarding IT-Security otherwise we play the boring ping pong game for more decades.
After realizing that the ping pong played between attackers and defenders in IT is totally boring to me, other approaches should be in scope
The theory.html will cover e.g. language security, cryptography computertheory, mathematics, machine learning, logic and theorem proves
United States Trends
- 1. Luka 60.7K posts
- 2. Clippers 17.7K posts
- 3. Lakers 47.2K posts
- 4. #DWTS 94.7K posts
- 5. Dunn 6,568 posts
- 6. #LakeShow 3,474 posts
- 7. Robert 136K posts
- 8. Kawhi 6,131 posts
- 9. Jaxson Hayes 2,380 posts
- 10. Reaves 11.6K posts
- 11. Ty Lue 1,552 posts
- 12. Collar 43.4K posts
- 13. Elaine 46.1K posts
- 14. Alix 15K posts
- 15. Jordan 116K posts
- 16. Zubac 2,281 posts
- 17. NORMANI 6,306 posts
- 18. Godzilla 36.7K posts
- 19. Colorado State 2,413 posts
- 20. Dylan 34.6K posts
Something went wrong.
Something went wrong.