by John

The author and RAND researchers recently wrote a paper detailing their findings on how cyber insurers understand and price risk.

Gaining insight into how cyber insurers understand and price risk

Posted in Infosec, Risk Management

by John

John McAfee decided what we really needed was physical, not software switches in our phones. Makes sense. You want to know the Wi-Fi is off, an analogue switch will ensure it.

Posted in Cool-Stuff, Privacy, Technology

by John

Major General Brett I. Williams discusses the distinction between cyberwarfare and information warfare. The distinction can be important!

Posted in Blog, Infosec, Nation State

by John

Solomon Smith and I presented at the Spring ISACA meeting in Iowa City, IA today on cyber education. 

http://alignedsecurity.com/index.php/2017/04/25/illowa-isaca-cyber-education-presentation/

Posted in Blog, Community, Events, Infosec

by John

There are certainly many technological and ethical considerations when developing brain-machine solutions, but Elon Musk formed Neuralink to explore this next frontier of human evolution. This is worth a read.

Posted in Cool-Stuff, Science

by John

Home | The Security Cards: A Security Threat Brainstorming Kit

The University of Washington has developed a set of 42 playing cards for modeling security and privacy threats. The cards encourage you to brainstorm about potential threats along 4 dimensions:

  • HUMAN IMPACT
  • ADVERSARY’S MOTIVATIONS
  • ADVERSARY’S RESOURCES
  • ADVERSARY’S METHODS

You may print the cards yourself or request them from the university.

Posted in Cool-Stuff, Exploits & Attacks, Infosec