Strategy for Breakfast The Hidden Power of Security Culture

Why Security Fails

For an industry that is so grounded in engineering and technology, information security can appear quite unscientific to those outside of the field. Your organization’s information security team can probably inundate you with reams of data about security operations and posture, including product performance benchmarks, security event logs, patches applied, and events counted. But the industry struggles to satisfactorily answer the question of why one organization’s security strategy seems to protect the organization, while another’s efforts fail miserably. It’s almost like fate or the wrath of the gods is involved. We seem to know everything about how information security works except how it actually works. That is not because information security is inherently mystical or more art than science. Security fails because strategy is not enough. Management guru Peter Drucker summed up the problem in a phrase: “culture eats strategy for breakfast.” Too often, security programs searching for the reasons why they failed in their technology or their strategy are simply looking in the wrong place for answers

Internet protocols are changing

Tech matters

When the Internet started to become widely used in the 1990s, most traffic used just a few protocols: IPv4 routed packets, TCP turned those packets into connections, SSL (later TLS) encrypted those connections, DNS named hosts to connect to, and HTTP was often the application protocol using it all.

The Honeynet Project Workshop 2017

Tech matters

The cyber threat landscape is constantly evolving with new attacks and techniques. As many security people will tell you, it takes a community of people dedicated to researching, developing and maintaining security tools, systems and services to be able to combat it. One such community is The Honeynet Project.

Wendy Wise on developing for virtual reality and augmented reality

The impact of ARKit on developers and consumers.

In this episode of the O’Reilly Programming Podcast, I talk with Wendy Wise, technical director of emerging technologies at Turner Broadcasting System, and author of the recent article “How to pick the right authoring tools for VR and AR.” She is developing Learning Paths, which will be released on Safari in 2018, on how to get started with ARKit using Unity and XCode.

Neuroevolution: A different kind of deep learning

The quest to evolve neural networks through evolutionary algorithms

Neuroevolution is making a comeback. Prominent artificial intelligence labs and researchers are experimenting with it, a string of new successes have bolstered enthusiasm, and new opportunities for impact in deep learning are emerging. Maybe you haven’t heard of neuroevolution in the midst of all the excitement over deep learning, but it’s been lurking just below the surface, the subject of study for a small, enthusiastic research community for decades. And it’s starting to gain more attention as people recognize its potential.

Transfers still a hot policy topic in 2017


The APNIC policy community was not the only RIR community to consider proposals relating to IPv4 transfers in 2017. Each of the regions had plenty of proposals or implementations during the year as people come to grips with IPv4 exhaustion.