Courtesy of US Navy, used under Creative Commons license. This is a guest post by William Akoto, a postdoctoral researcher jointly appointed at the Sié Chéou-Kang Center for International Security & Diplomacy at the Korbel School of International...
Courtesy of US Navy, used under Creative Commons license. This is a guest post by William Akoto, a postdoctoral researcher jointly appointed at the Sié Chéou-Kang Center for International Security & Diplomacy at the Korbel School of International...
I have yet to weigh in on the recent hack on the Office of Personnel Management (OPM). Mostly this is due to two reasons. First is the obvious one for an academic: it is summer! But the second,...
The Department of Defense’s (DoD) new Cyber Strategy is a refinement of past attempts at codifying and understanding the “new terrain” of cybersecurity threats to the United States. While I...
Last week the New America Foundation hosted its launch for an interdisciplinary cybersecurity initiative. I was fortunate enough to be asked to attend and speak, but the real benefit was that I was...
Marc Maron, on his popular WTF Podcast, made an offhand remark that he does not prepare for his comedy performances. He feels that preparing is for cowards, that you need to be ready and willing to fail in your work since there is a fine line between a unique achievement and total failure. Skirting this line led him to ruin many times in his career, but it has also led him to the transcendent place he is at now. He has reached the heights of his field by putting it all on the line and risking total devastation by focusing on his Podcast, a new and untested medium at the time. Now he has...
I was struck this morning to read a post on a Cyber Security forum with a link stating the "Super Bowl was Hacked!" Clicking on the link lead to this write up and picture. I can't think of better visualization of the need for basic cyber hygiene. The cyber security industry kills many trees and wastes much bandwidth on discussions of cyber offensive and defensive strategies. Yet, if we can't practice basic cyber hygiene, what is the point? The UK Cabinet estimated that as much of 80 percent of cyber crime can be prevented with basic cyber hygiene. While that figure is pretty much a wild...
The nature of cyber discourse concerns me, and this is a point I have written about extensively with Ryan Maness (Valeriano and Maness 2012a, Valeriano and Maness 2012b, Valeriano and Maness 2014). The idea is that threats we see materialize from cyberspace seem to vastly outweigh any other threats we have faced, ever. Some argue this cyber threat is different, faster, and bigger. I question this conventional wisdom. Is the cyber threat really any different than any other threat we have faced? To this point, I have generally avoided writing about cyber-crime, but the logic suggesting...