Data Safety and Information Security

Data Safety and Information Security

641 bookmarks
Custom sorting
ORCID
ORCID
·orcid.org·
ORCID
Subversive Trilemma: Why Cyber Operations Fall Short of Expectations
Subversive Trilemma: Why Cyber Operations Fall Short of Expectations
Abstract. Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. Many expect cyber operations to provide independent utility in both warfare and low-intensity competition. Underlying these expectations are broadly shared assumptions that information technology increases operational effectiveness. But a growing body of research shows how cyber operations tend to fall short of their promise. The reason for this shortfall is their subversive mechanism of action. In theory, subversion provides a way to exert influence at lower risks than force because it is secret and indirect, exploiting systems to use them against adversaries. The mismatch between promise and practice is the consequence of the subversive trilemma of cyber operations, whereby speed, intensity, and control are negatively correlated. These constraints pose a trilemma for actors because a gain in one variable tends to produce losses across the other two variables. A case study of the Russo-Ukrainian conflict provides empirical support for the argument. Qualitative analysis leverages original data from field interviews, leaked documents, forensic evidence, and local media. Findings show that the subversive trilemma limited the strategic utility of all five major disruptive cyber operations in this conflict.
·direct.mit.edu·
Subversive Trilemma: Why Cyber Operations Fall Short of Expectations
How the Saitama backdoor uses DNS tunnelling
How the Saitama backdoor uses DNS tunnelling
A walkthrough of one of the stealthy communication techniques employed in a recent attack using APT34's Saitama backdoor.
·blog.malwarebytes.com·
How the Saitama backdoor uses DNS tunnelling
OAuth Security in a Cloud Native World
OAuth Security in a Cloud Native World
Outlining how my thinking has evolved after working with various cloud deployment types and integrating security into many kinds of apps.
·thenewstack.io·
OAuth Security in a Cloud Native World
Does GraphQL Introduce New Security Risks?
Does GraphQL Introduce New Security Risks?
GraphQL is a friendly alternative to REST APIs. But there are some security repercussions of adopting GraphQL developers need to know.
·devops.com·
Does GraphQL Introduce New Security Risks?
Linux Security Study Reveals When, How You Patch Matters
Linux Security Study Reveals When, How You Patch Matters
Computer security only happens when software is kept up to date. That should be a basic tenet for business users and IT departments. Apparently, it isn’t. At least for some Linux users who ignore installing patches, critical or otherwise.
·linuxinsider.com·
Linux Security Study Reveals When, How You Patch Matters
Removing the stigma of a CVE | The GitHub Blog
Removing the stigma of a CVE | The GitHub Blog
Do you worry that a CVE will hurt the reputation of your project? In reality, CVEs are a tracking number, and nothing more. Here's how we think of them at GitHub.
·github.blog·
Removing the stigma of a CVE | The GitHub Blog
The Problem With Security
The Problem With Security
Making security every team’s problem and recruiting those most interested to formalize their involvement is a solid cultural approach.
·devops.com·
The Problem With Security
First Malware Running on AWS Lambda Discovered
First Malware Running on AWS Lambda Discovered
Amazon Web Services (AWS) Lambda, serverless computing's poster child, is over seven years old and only now has experienced the first malware specifically targeting Lambda, Denonia
·thenewstack.io·
First Malware Running on AWS Lambda Discovered
How to Build a Zero-Trust Culture
How to Build a Zero-Trust Culture
When few developers see security it as their responsibility, how do you build a culture to support a zero trust strategy in your organization? #security #DevSecOps #zerotrust
·thenewstack.io·
How to Build a Zero-Trust Culture
The Ukrainian War, PKI, and Censorship
The Ukrainian War, PKI, and Censorship
PKI has created a global trust framework for the web. But the war in Ukraine has shone a light on its weaknesses. Hierarchies are not good architectures for building robust, trustworthy, and stable digital systems.
·windley.com·
The Ukrainian War, PKI, and Censorship
Provisional Authenticity and Functional Privacy
Provisional Authenticity and Functional Privacy
Provisional authenticity and confidentiality can help us manage the trade offs between privacy and authenticity to support online accountability along with functional privacy.
·windley.com·
Provisional Authenticity and Functional Privacy
Software Supply Chain Security: Tearing Down the Silos
Software Supply Chain Security: Tearing Down the Silos
Both application and infrastructure security are required to keep a cloud native system safe. A single solution can integrate both to foil hackers. #DevSecOps #security
·thenewstack.io·
Software Supply Chain Security: Tearing Down the Silos