Benjamin Janis Submitted by Benjamin Janis on September 15th, 2022
Benjamin Janis Submitted by Benjamin Janis on September 15th, 2022
Benjamin Janis Submitted by Benjamin Janis on September 29th, 2021
Benjamin Janis Submitted by Benjamin Janis on September 29th, 2021
Cybersecurity’s human adversarial engagement is often lost in discussions of cybersecurity. We discuss how defenders’ focus on technology unintentionally creates vulnerabilities which can be exploited by threat actors. In particular, we discuss how the convergence of cyber awareness training and defensive technologies is exploited by threat actors with devastating consequences.
Submitted by Robert Zager on September 7th, 2018
Submitted by Robert Zager on August 29th, 2017
Submitted by Robert Zager on May 23rd, 2017
Submitted by Robert Zager on May 22nd, 2017
George Washington called West Point, “the key to the continent.” The reasoning that Washington employed in establishing the fortifications at West Point is instructive to modern cyber warriors.
Submitted by Robert Zager on May 22nd, 2017
Subscribe to Cybersecurity