Cybersecurity Taking down 'the grid:' simple is strong A third viewpoint in OT security discussions: disrupting OT processes is technically complex, but there are easier ways to impact OT. Simple attacks are not the gravest threat to OT, but they are the most under-estimated threat to OT.
Christianity Isaiah 29:13-16 Learning from Isaiah how to love God personally, depend on Him, and submit to His plans.
Hacking Hacking/Infosec Resources Hacking resources: links, tutorials, courses, and books on security. This post will continue to be updated with new resources.
Members only WYSK WYSK: 10/01/21 1. Dark Patterns; 2. Facebook's Metaverse; 3. Youth Surveillance; 4. Deterring Adversaries
QuickThoughts The Rubicon Theory of Social Media Social media's stated function as a vehicle for relationship and connection is generally inaccurate. Instead, social media's structure most often causes users' mindsets to become more aggressive, overconfident, and less rational.
Members only WYSK WYSK: 09/24/21 1. Two Michaels; 2. Chinese Phones; 3. Gaming Control; 4. Treasury & Ransomware
Members only WYSK WYSK: 09/17/21 1. Facebook Files; 2. Azure Vulns; 3. Raven Indictments; 4. Navalny App
Members only WYSK WYSK: 09/10/21 This week: 1. Ransomware Motivations; 2. Misinformation Engagement; 3. WhatsApp Monitoring; 4. Germany & Pegasus
Cybersecurity Ransomware as Pain: heeding pain stimuli for survival Ransomware is currently providing a pain stimulus to our country; the US has an opportunity to take action to avoid larger impacts. If the US responds poorly to that stimulus, the outcome will be fatal.
Members only WYSK WYSK: 09/03/21 This week: 1. New Puritans; 2. Texas Legislation; 3. Taliban Biometrics; 4. Australian Liberty
Cybersecurity Ransomware Get-well plan The US Government should pursue five policies through legislation, investment, and action, to drive the right incentives for asset-owners to improve security.
Members only WYSK WYSK: 08/27/21 This week: 1. Belarusian Hacktivists; 2. Azure Flaw; 3. Chinese Regulations; 4. T-Mobile Breach
Members only WYSK WYSK: 08/20/21 This week: 1. Afghanistan Withdrawal; 2. Amazon Expansion; 3. CYBERCOM and Ransomware; 4. IDF Offense
Members only WYSK WYSK: 07/16/21 This week: 1. Chinese Vulnerabilities; 2. Kaseya Security; 3. Journalist Kidnapping; 4. MAID Unmasked
QuickThoughts Counterfeits Unknown: Deepfakes of Anthony Bourdain Deepfakes present greater risk to societal cohesion through our entertainment than they do through disinformation.
Members only WYSK WYSK: 07/09/21 This week: 1. Genetic Analysis; 2. Kaseya Ransomware; 3. YouTube Regrets; 4. Juul Lobbying
Members only WYSK WYSK: 7/02/21 This week: 1. Amazon Unrest; 2. Worker Shortages; 3. Print Nightmare; 4. Exxon's Undermining
Dances With Wolves Part 2: Bonus Issues There are more than just three critical issues with Clegg's analysis of Facebook that need to be considered.
Members only WYSK WYSK: 6/25/21 This week: 1. Detained Abroad; 2. Surveillance Indictments; 3. Banning Surveillance; 4. VR Ads
Cybersecurity Regulation and Ransomware: Fix the *Right* Problem Any ransomware solutions dictated to industry that fail to primarily address the business side will be ineffective at best, and are most likely to be costly, ineffective, and burn political capital with industry and voters.
Governance Dances with Wolves: A Response to Nick Clegg's 'It Takes Two to Tango' There are three critical issues with Clegg's analysis of Facebook that need to be considered.
Members only WYSK WYSK: 6/18/21 This week: 1. Lina Khan; 2. Ransom Efficacy; 3. Exposing Dissidents; 4. Capital Ownership
WYSK WYSK: 6/11/21 This week: 1. Digital Public Goods; 2. Colonial Pipeline; 3. Article V; 4. Costly Subsidies
Members only WYSK Wysk: 5/28/21 This week: 1. Chinese eCommerce; 2. Congressional Oversight; 3. Belarusian State Hijackings; 4. Exported Surveillance