WYSK WYSK: 04/08/22 This Week: 1. AirTag Stalking; 2. Law Inequality; 3. Organ Transplantation; 4. Facebook Sanctions
WYSK WYSK: 03/04/22 This Week: 1. Ukraine; 2. Conti and Nvidia; 3. Personalized Pricing; 4. Amazon's Ads
WYSK WYSK: 02/11/22 This Week: 1. Cybersecurity Priorities; 2. Judicial Algorithms; 3. Nothing Sacred; 4. Koningshaven Bridge
Cybersecurity Open Source and Apple Pie Software security can be achieved through liability; companies must be responsible for software they choose to adopt.
WYSK WYSK: 01/14/22 This Week: 1. Kroger Memo; 2. Tesla's Showroom; 3. Opensource Deletions; 4. Civil War?
WYSK WYSK: 01/07/22 This Week: 1. Extrapolation Tracking; 2. Carter's Fear; 3. Kazakhstan Unrest; 4. Children's Privacy
WYSK WYSK: 12/31/21 This Week: 1. Alexa Challenge; 2. Housing Realities; 3. AI Companions; 4. Facebook Quotes
WYSK WYSK: 12/04/21 This Week: 1. Amazon Strong-arming; 2. Funding Misinformation; 3. Xinjiang Lobbying; 4. Gray Goo
Members only WYSK WYSK: 11/12/21 This week: 1. Migrant Weaponization; 2. Evan Neumann; 3. EU Warning; 4. FDA Pick
Cybersecurity Critical Infrastructure Security A quick US Critical Infrastructure Security primer, largely based on a report from the Congressional Research Service. What is Critical Infrastructure Security, what regulations govern it, and how has it been done so far?
WYSK WYSK: 11/05/21 This week: 1. Wastewater Regulations; 2. Strategic Intent; 3. Chinese AI; 4. Appalachian Record
Members only WYSK WYSK: 10/29/21 This week: 1. Google Unredacted; 2. Global Tax; 3. Facebook's Meta Rebrand; 4. Paid Leave
Members only WYSK WYSK: 10/22/21 This week: 1. Common Prosperity; 2. Rewriting Headlines; 3. JAMA Act; 4. Climate Assessment
Governance Biodiversity Losses The earth is losing biodiversity at a catastrophic rate during Earth's 6th mass extinction event. Urgent action is needed to slow and reverse the effects that we can.
Members only WYSK WYSK: 10/15/21 1. Hypersonic Missiles; 2. Fuel Shortages; 3. Amazon Manipulation; 4. Ring Surveillance
Governance Section 230: Challenges and Enforcement While allowing companies to be recognized as Information Content Providers as defined in Section 230 of the Communications Decency Act comes with challenges, the enforcement benefits exceed the risks.
Governance Section 230: Reinterpret, don't Abolish When they provide a curated subset of the content they believe will be most relevant or meaningful, companies create new content and become Information Content Providers as defined in Section 230 of the Communications Decency Act.
Members only WYSK WYSK: 10/08/21 1. Western Schröderizatsiya; 2. Pandora Papers; 3. Syniverse Hack; 4. Uyghur Torture
Cybersecurity Taking down 'the grid:' simple is strong A third viewpoint in OT security discussions: disrupting OT processes is technically complex, but there are easier ways to impact OT. Simple attacks are not the gravest threat to OT, but they are the most under-estimated threat to OT.
Christianity Isaiah 29:13-16 Learning from Isaiah how to love God personally, depend on Him, and submit to His plans.
Hacking Hacking/Infosec Resources Hacking resources: links, tutorials, courses, and books on security. This post will continue to be updated with new resources.