tag:blogger.com,1999:blog-37798047.post8860792635424672407..comments2024-01-16T05:48:33.523-05:00Comments on Errata Security: How to irregular cyber warfareDavid Maynorhttp://www.blogger.com/profile/09921229607193067441noreply@blogger.comBlogger4125tag:blogger.com,1999:blog-37798047.post-59627339626655620652018-10-22T14:16:57.819-04:002018-10-22T14:16:57.819-04:00It was about six years back, just before the consi...It was about six years back, just before the considerable Y2K startle, I had my first web understanding. This experience barely set me up for the uneasiness I would come to know with twenty four hour get to. I don't believe I'm the just a single encountering it. Favored are those with limited access. <a href="https://www.injectionfoamphoenix.com" rel="nofollow">View More</a> Peter Floydhttps://www.blogger.com/profile/14532264814565369687noreply@blogger.comtag:blogger.com,1999:blog-37798047.post-58523755942255254292018-10-19T16:56:54.400-04:002018-10-19T16:56:54.400-04:00Based on all of the marketing I see, Machine Learn...Based on all of the marketing I see, Machine Learning can predict attacks.Unknownhttps://www.blogger.com/profile/15357840241031190415noreply@blogger.comtag:blogger.com,1999:blog-37798047.post-51613867075724722192018-10-14T20:49:59.212-04:002018-10-14T20:49:59.212-04:00I'm curious about "... which should antic...I'm curious about "... which should anticipate attacks based not on their desired effect, but what our vulnerabilities make possible."<br /><br />But our vulnerabilities are unknown. Yes? Is there some method for estimating where vulnerabilities are most likely?Unknownhttps://www.blogger.com/profile/06079203653900206469noreply@blogger.comtag:blogger.com,1999:blog-37798047.post-61151026034347370152018-10-14T11:20:51.393-04:002018-10-14T11:20:51.393-04:00IMHO there's nothing wrong w/ applying a bit o...IMHO there's nothing wrong w/ applying a bit of classical military philosophy to 21st-century cyber warfare as long as it correlates. We're talking higher-level security principles which the technical application is based on. https://goo.gl/z695pyAnonymousnoreply@blogger.com