study4cyberpax's profile picture.

study4cyberpeace.com

@study4cyberpax

study4cyberpeace.com reposted

NATO mulls 'offensive defense' with cyber warfare rules reut.rs/2zRFYT8

ReutersWorld's tweet image. NATO mulls 'offensive defense' with cyber warfare rules reut.rs/2zRFYT8

Bericht zur Lage der IT Sicherheit in Deutschland bsi.bund.de/DE/Presse/Pres…


Neue Cyberwar-Strategie der EU ganz ohne die USA - fm4.ORF.at fm4.orf.at/stories/288040…


study4cyberpeace.com reposted

#EDA ChiefExec Domecq's key take-aways from #EDAConf2017: 1) #cyber can become a weapon of mass destruction 2) we still see too much fragmentation in the #cyber domain 3) education and training are key.


study4cyberpeace.com reposted

Worum geht es wirklich beim Thema #Cyber-Krieg? CSS Expertin Myriam Dunn Cavelty schafft Klarheit @CyberMyri srf.ch/news/panorama/…

CSS_ETHZurich's tweet image. Worum geht es wirklich beim Thema #Cyber-Krieg? CSS Expertin Myriam Dunn Cavelty schafft Klarheit @CyberMyri srf.ch/news/panorama/…

study4cyberpeace.com reposted

U.S. Army to Stop Buying Tactical Network Systems, General Says dodbuzz.com/2017/09/28/arm… h/t @BlogsofWar


Online-Paper Cyberwar-methods-and-practice (English Version) by Professor Saalbach dirk-koentopp.com/downloads/saal… [PDF]


The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth by Erik Gartzke muse.jhu.edu/journals/inter… [PDF]


LangSec Workshop at IEEE Security & Privacy, Thursday May 25, 2017 spw17.langsec.org/papers.html [Papers]


"The potential impossibility of attribution in cyberspace causes at least three challenges [...]" study4cyberpeace.com/images/A_Non-A… [PDF]


Why language matters – The inherent insecurity of languages and what we can do against it | sicherheitspolitik-blog.de/2015/05/20/why… #langsec


NATO - SPS Conference "Cyberstrategy for Jordan" | nato.int/cps/en/natohq/… [info] and conference procedure recurity-labs.com/content/pub/NA… [slides]


Interesting course and information collection for educational purpose wiki.ucalgary.ca/page/Courses/C… //cc @mlocasto


And for sure, some people like this ping pong game because they can win fast and earn the low hanging fruits from the ping-pong tree.


Promote smart ideas of people who think out of the box regarding IT-Security otherwise we play the boring ping pong game for more decades.


After realizing that the ping pong played between attackers and defenders in IT is totally boring to me, other approaches should be in scope


The theory.html will cover e.g. language security, cryptography computertheory, mathematics, machine learning, logic and theorem proves


United States Trends

Loading...

Something went wrong.


Something went wrong.